You've already forked linux-packaging-mono
Imported Upstream version 4.8.0.309
Former-commit-id: 5f9c6ae75f295e057a7d2971f3a6df4656fa8850
This commit is contained in:
parent
ee1447783b
commit
94b2861243
@@ -1,119 +0,0 @@
|
||||
//
|
||||
// BinarySecretSecurityToken.cs
|
||||
//
|
||||
// Author:
|
||||
// Atsushi Enomoto <atsushi@ximian.com>
|
||||
//
|
||||
// Copyright (C) 2006 Novell, Inc. http://www.novell.com
|
||||
//
|
||||
// Permission is hereby granted, free of charge, to any person obtaining
|
||||
// a copy of this software and associated documentation files (the
|
||||
// "Software"), to deal in the Software without restriction, including
|
||||
// without limitation the rights to use, copy, modify, merge, publish,
|
||||
// distribute, sublicense, and/or sell copies of the Software, and to
|
||||
// permit persons to whom the Software is furnished to do so, subject to
|
||||
// the following conditions:
|
||||
//
|
||||
// The above copyright notice and this permission notice shall be
|
||||
// included in all copies or substantial portions of the Software.
|
||||
//
|
||||
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
||||
// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||
// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
||||
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
//
|
||||
using System;
|
||||
using System.Collections.ObjectModel;
|
||||
using System.Xml;
|
||||
using System.IdentityModel.Policy;
|
||||
using System.IdentityModel.Tokens;
|
||||
|
||||
namespace System.ServiceModel.Security.Tokens
|
||||
{
|
||||
public class BinarySecretSecurityToken : SecurityToken
|
||||
{
|
||||
ReadOnlyCollection<SecurityKey> keys;
|
||||
|
||||
string id;
|
||||
byte [] key;
|
||||
bool allow_crypto;
|
||||
DateTime valid_from = DateTime.Now.ToUniversalTime ();
|
||||
|
||||
BinarySecretSecurityToken (string id, bool allowCrypto)
|
||||
{
|
||||
this.id = id;
|
||||
allow_crypto = allowCrypto;
|
||||
}
|
||||
|
||||
public BinarySecretSecurityToken (byte [] key)
|
||||
: this ("uuid:" + Guid.NewGuid ().ToString (), key)
|
||||
{
|
||||
}
|
||||
|
||||
public BinarySecretSecurityToken (string id, byte [] key)
|
||||
: this (id, key, false)
|
||||
{
|
||||
}
|
||||
|
||||
protected BinarySecretSecurityToken (string id, byte [] key, bool allowCrypto)
|
||||
: this (id, allowCrypto)
|
||||
{
|
||||
if (key == null)
|
||||
throw new ArgumentNullException ("key");
|
||||
this.key = key;
|
||||
|
||||
SecurityKey [] arr = new SecurityKey [] {new InMemorySymmetricSecurityKey (key)};
|
||||
keys = new ReadOnlyCollection<SecurityKey> (arr);
|
||||
}
|
||||
|
||||
public BinarySecretSecurityToken (int keySizeInBits)
|
||||
: this ("uuid:" + Guid.NewGuid ().ToString (), keySizeInBits)
|
||||
{
|
||||
}
|
||||
|
||||
public BinarySecretSecurityToken (string id, int keySizeInBits)
|
||||
: this (id, keySizeInBits, false)
|
||||
{
|
||||
}
|
||||
|
||||
protected BinarySecretSecurityToken (string id, int keySizeInBits, bool allowCrypto)
|
||||
: this (id, allowCrypto)
|
||||
{
|
||||
if (keySizeInBits < 0)
|
||||
throw new ArgumentOutOfRangeException ("keySizeInBits");
|
||||
|
||||
this.key = new byte [keySizeInBits >> 3 + (keySizeInBits % 8 == 0 ? 0 : 1)];
|
||||
|
||||
SecurityKey [] arr = new SecurityKey [] {new InMemorySymmetricSecurityKey (key)};
|
||||
keys = new ReadOnlyCollection<SecurityKey> (arr);
|
||||
}
|
||||
|
||||
public override DateTime ValidFrom {
|
||||
get { return valid_from; }
|
||||
}
|
||||
|
||||
public override DateTime ValidTo {
|
||||
get { return DateTime.MaxValue.AddDays (-1); }
|
||||
}
|
||||
|
||||
public override string Id {
|
||||
get { return id; }
|
||||
}
|
||||
|
||||
public int KeySize {
|
||||
get { return key.Length; }
|
||||
}
|
||||
|
||||
public override ReadOnlyCollection<SecurityKey> SecurityKeys {
|
||||
get { return keys; }
|
||||
}
|
||||
|
||||
public byte [] GetKeyBytes ()
|
||||
{
|
||||
return (byte []) key.Clone ();
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,51 +0,0 @@
|
||||
//
|
||||
// InternalEncryptedKeyIdentifierClause.cs
|
||||
//
|
||||
// Author:
|
||||
// Atsushi Enomoto <atsushi@ximian.com>
|
||||
//
|
||||
// Copyright (C) 2007 Novell, Inc. http://www.novell.com
|
||||
//
|
||||
// Permission is hereby granted, free of charge, to any person obtaining
|
||||
// a copy of this software and associated documentation files (the
|
||||
// "Software"), to deal in the Software without restriction, including
|
||||
// without limitation the rights to use, copy, modify, merge, publish,
|
||||
// distribute, sublicense, and/or sell copies of the Software, and to
|
||||
// permit persons to whom the Software is furnished to do so, subject to
|
||||
// the following conditions:
|
||||
//
|
||||
// The above copyright notice and this permission notice shall be
|
||||
// included in all copies or substantial portions of the Software.
|
||||
//
|
||||
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
||||
// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||
// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
||||
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
//
|
||||
using System;
|
||||
using System.Collections.ObjectModel;
|
||||
using System.Security.Cryptography.Xml;
|
||||
using System.Xml;
|
||||
using System.IdentityModel.Tokens;
|
||||
|
||||
namespace System.ServiceModel.Security.Tokens
|
||||
{
|
||||
internal class InternalEncryptedKeyIdentifierClause : BinaryKeyIdentifierClause
|
||||
{
|
||||
public InternalEncryptedKeyIdentifierClause (byte [] hash)
|
||||
: base (null, hash, false)
|
||||
{
|
||||
}
|
||||
|
||||
public override bool Matches (SecurityKeyIdentifierClause keyIdentifierClause)
|
||||
{
|
||||
InternalEncryptedKeyIdentifierClause kic = keyIdentifierClause as InternalEncryptedKeyIdentifierClause;
|
||||
if (kic == null)
|
||||
return false;
|
||||
return Matches (kic.GetRawBuffer ());
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,176 +0,0 @@
|
||||
//
|
||||
// WrappedKeySecurityToken.cs
|
||||
//
|
||||
// Author:
|
||||
// Atsushi Enomoto <atsushi@ximian.com>
|
||||
//
|
||||
// Copyright (C) 2006 Novell, Inc. http://www.novell.com
|
||||
//
|
||||
// Permission is hereby granted, free of charge, to any person obtaining
|
||||
// a copy of this software and associated documentation files (the
|
||||
// "Software"), to deal in the Software without restriction, including
|
||||
// without limitation the rights to use, copy, modify, merge, publish,
|
||||
// distribute, sublicense, and/or sell copies of the Software, and to
|
||||
// permit persons to whom the Software is furnished to do so, subject to
|
||||
// the following conditions:
|
||||
//
|
||||
// The above copyright notice and this permission notice shall be
|
||||
// included in all copies or substantial portions of the Software.
|
||||
//
|
||||
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
||||
// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||
// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
||||
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
//
|
||||
using System;
|
||||
using System.Collections.ObjectModel;
|
||||
using System.Security.Cryptography;
|
||||
using System.Security.Cryptography.Xml;
|
||||
using System.Xml;
|
||||
using System.IdentityModel.Policy;
|
||||
using System.IdentityModel.Tokens;
|
||||
|
||||
namespace System.ServiceModel.Security.Tokens
|
||||
{
|
||||
public class WrappedKeySecurityToken : SecurityToken
|
||||
{
|
||||
string id;
|
||||
byte [] raw_key;
|
||||
byte [] wrapped_key;
|
||||
string wrap_alg;
|
||||
SecurityToken wrap_token;
|
||||
SecurityKeyIdentifier wrap_token_ref;
|
||||
DateTime valid_from = DateTime.Now.ToUniversalTime ();
|
||||
ReadOnlyCollection<SecurityKey> keys;
|
||||
ReferenceList reference_list;
|
||||
byte [] keyhash;
|
||||
|
||||
public WrappedKeySecurityToken (
|
||||
string id,
|
||||
byte [] keyToWrap,
|
||||
string wrappingAlgorithm,
|
||||
SecurityToken wrappingToken,
|
||||
SecurityKeyIdentifier wrappingTokenReference)
|
||||
{
|
||||
if (id == null)
|
||||
throw new ArgumentNullException ("id");
|
||||
if (keyToWrap == null)
|
||||
throw new ArgumentNullException ("keyToWrap");
|
||||
if (wrappingAlgorithm == null)
|
||||
throw new ArgumentNullException ("wrappingAlgorithm");
|
||||
if (wrappingToken == null)
|
||||
throw new ArgumentNullException ("wrappingToken");
|
||||
|
||||
raw_key = keyToWrap;
|
||||
this.id = id;
|
||||
wrap_alg = wrappingAlgorithm;
|
||||
wrap_token = wrappingToken;
|
||||
wrap_token_ref = wrappingTokenReference;
|
||||
Collection<SecurityKey> l = new Collection<SecurityKey> ();
|
||||
foreach (SecurityKey sk in wrappingToken.SecurityKeys) {
|
||||
if (sk.IsSupportedAlgorithm (wrappingAlgorithm)) {
|
||||
wrapped_key = sk.EncryptKey (wrappingAlgorithm, keyToWrap);
|
||||
l.Add (new InMemorySymmetricSecurityKey (keyToWrap));
|
||||
break;
|
||||
}
|
||||
}
|
||||
keys = new ReadOnlyCollection<SecurityKey> (l);
|
||||
if (wrapped_key == null)
|
||||
throw new ArgumentException (String.Format ("None of the security keys in the argument token supports specified wrapping algorithm '{0}'", wrappingAlgorithm));
|
||||
}
|
||||
|
||||
internal byte [] RawKey {
|
||||
get { return raw_key; }
|
||||
}
|
||||
|
||||
// It is kind of compromised solution to output
|
||||
// ReferenceList inside e:EncryptedKey and might disappear
|
||||
// when non-wrapped key is represented by another token type.
|
||||
internal ReferenceList ReferenceList {
|
||||
get { return reference_list; }
|
||||
set { reference_list = value; }
|
||||
}
|
||||
|
||||
public override DateTime ValidFrom {
|
||||
get { return valid_from; }
|
||||
}
|
||||
|
||||
public override DateTime ValidTo {
|
||||
get { return DateTime.MaxValue.AddDays (-1); }
|
||||
}
|
||||
|
||||
public override string Id {
|
||||
get { return id; }
|
||||
}
|
||||
|
||||
public override ReadOnlyCollection<SecurityKey> SecurityKeys {
|
||||
get { return keys; }
|
||||
}
|
||||
|
||||
public string WrappingAlgorithm {
|
||||
get { return wrap_alg; }
|
||||
}
|
||||
|
||||
public SecurityToken WrappingToken {
|
||||
get { return wrap_token; }
|
||||
}
|
||||
|
||||
public SecurityKeyIdentifier WrappingTokenReference {
|
||||
get { return wrap_token_ref; }
|
||||
}
|
||||
|
||||
public byte [] GetWrappedKey ()
|
||||
{
|
||||
return (byte []) wrapped_key.Clone ();
|
||||
}
|
||||
|
||||
internal void SetWrappedKey (byte [] value)
|
||||
{
|
||||
wrapped_key = (byte []) value.Clone ();
|
||||
}
|
||||
|
||||
[MonoTODO]
|
||||
public override bool CanCreateKeyIdentifierClause<T> ()
|
||||
{
|
||||
/*
|
||||
foreach (SecurityKeyIdentifierClause k in WrappingTokenReference) {
|
||||
Type t = k.GetType ();
|
||||
if (t == typeof (T) || t.IsSubclassOf (typeof (T)))
|
||||
return true;
|
||||
}
|
||||
*/
|
||||
return false;
|
||||
}
|
||||
|
||||
[MonoTODO]
|
||||
public override T CreateKeyIdentifierClause<T> ()
|
||||
{
|
||||
/*
|
||||
foreach (SecurityKeyIdentifierClause k in WrappingTokenReference) {
|
||||
Type t = k.GetType ();
|
||||
if (t == typeof (T) || t.IsSubclassOf (typeof (T)))
|
||||
return (T) k;
|
||||
}
|
||||
*/
|
||||
throw new NotSupportedException (String.Format ("WrappedKeySecurityToken cannot create '{0}'", typeof (T)));
|
||||
}
|
||||
|
||||
public override bool MatchesKeyIdentifierClause (SecurityKeyIdentifierClause keyIdentifierClause)
|
||||
{
|
||||
LocalIdKeyIdentifierClause lkic = keyIdentifierClause as LocalIdKeyIdentifierClause;
|
||||
if (lkic != null && lkic.LocalId == Id)
|
||||
return true;
|
||||
|
||||
InternalEncryptedKeyIdentifierClause khic = keyIdentifierClause as InternalEncryptedKeyIdentifierClause;
|
||||
if (keyhash == null)
|
||||
keyhash = SHA1.Create ().ComputeHash (wrapped_key);
|
||||
if (khic != null && khic.Matches (keyhash))
|
||||
return true;
|
||||
|
||||
return false;
|
||||
}
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user