e79aa3c0ed
Former-commit-id: a2155e9bd80020e49e72e86c44da02a8ac0e57a4
99 lines
3.6 KiB
C#
99 lines
3.6 KiB
C#
//-----------------------------------------------------------------------
|
|
// <copyright file="RequestedProofToken.cs" company="Microsoft">
|
|
// Copyright (c) Microsoft Corporation. All rights reserved.
|
|
// </copyright>
|
|
//-----------------------------------------------------------------------
|
|
|
|
namespace System.IdentityModel.Protocols.WSTrust
|
|
{
|
|
using System.IdentityModel.Tokens;
|
|
|
|
/// <summary>
|
|
/// The content of a RequestedProofToken element could be EncryptedSecurityToken which means that EncryptedKey is used
|
|
/// under the RequestedProofToken. If the security token is a regular token, such as a SCT,
|
|
/// then its session key will be the material which gets encrypted. Another possibility is where
|
|
/// we use combined entropy, then RequestedProofToken will only contain a ComputedKey element.
|
|
/// </summary>
|
|
public class RequestedProofToken
|
|
{
|
|
string _computedKeyAlgorithm;
|
|
ProtectedKey _keys;
|
|
|
|
/// <summary>
|
|
/// In case of combined entropy, construct a requestedprooftoken
|
|
/// instance with computed key algorithm to specify the algorithm used to
|
|
/// calculate the session key.
|
|
/// </summary>
|
|
/// <param name="computedKeyAlgorithm">The algorithm used to computed the session key in
|
|
/// the combined entropy case.</param>
|
|
public RequestedProofToken(string computedKeyAlgorithm)
|
|
: base()
|
|
{
|
|
if (string.IsNullOrEmpty(computedKeyAlgorithm))
|
|
{
|
|
DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("computedKeyAlgorithm");
|
|
}
|
|
|
|
_computedKeyAlgorithm = computedKeyAlgorithm;
|
|
}
|
|
|
|
/// <summary>
|
|
/// When the requested proof token contains real key in plain text.
|
|
/// </summary>
|
|
/// <param name="secret">The key material.</param>
|
|
public RequestedProofToken(byte[] secret)
|
|
{
|
|
_keys = new ProtectedKey(secret);
|
|
}
|
|
|
|
/// <summary>
|
|
/// When the requested proof token contains real key encrypted.
|
|
/// </summary>
|
|
/// <param name="secret">The key material.</param>
|
|
/// <param name="wrappingCredentials">The encrypting credentials to encrypt the key material.</param>
|
|
public RequestedProofToken(byte[] secret, EncryptingCredentials wrappingCredentials)
|
|
{
|
|
_keys = new ProtectedKey(secret, wrappingCredentials);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Constructs a requested proof token instance with the protected key.
|
|
/// </summary>
|
|
/// <param name="protectedKey">The protected key which can be either binary secret or encrypted key.</param>
|
|
public RequestedProofToken(ProtectedKey protectedKey)
|
|
{
|
|
if (protectedKey == null)
|
|
{
|
|
throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("protectedKey");
|
|
}
|
|
|
|
_keys = protectedKey;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Gets the computed key algorithm used to calculate the session key in the combined
|
|
/// entropy case.
|
|
/// </summary>
|
|
public string ComputedKeyAlgorithm
|
|
{
|
|
get
|
|
{
|
|
return _computedKeyAlgorithm;
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// In the case when the requested proof token contains the real key,
|
|
/// ProtectedKey getter will returns the real key bytes either encrypted
|
|
/// or plaintext.
|
|
/// </summary>
|
|
public ProtectedKey ProtectedKey
|
|
{
|
|
get
|
|
{
|
|
return _keys;
|
|
}
|
|
}
|
|
}
|
|
}
|