File: AsymmetricProofDescriptor.cs

package info (click to toggle)
mono 4.6.2.7%2Bdfsg-1
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 778,148 kB
  • ctags: 914,052
  • sloc: cs: 5,779,509; xml: 2,773,713; ansic: 432,645; sh: 14,749; makefile: 12,361; perl: 2,488; python: 1,434; cpp: 849; asm: 531; sql: 95; sed: 16; php: 1
file content (82 lines) | stat: -rw-r--r-- 2,707 bytes parent folder | download | duplicates (7)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
//------------------------------------------------------------
// Copyright (c) Microsoft Corporation.  All rights reserved.
//------------------------------------------------------------
using System;
using System.Security.Cryptography;
using RSTR = System.IdentityModel.Protocols.WSTrust.RequestSecurityTokenResponse;

namespace System.IdentityModel.Tokens
{
    /// <summary>
    /// This class can be used for issuing the asymmetric key based token.
    /// </summary>
    public class AsymmetricProofDescriptor : ProofDescriptor
    {
        SecurityKeyIdentifier _keyIdentifier;

        /// <summary>
        /// Constructor for extensibility 
        /// </summary>
        public AsymmetricProofDescriptor()
        {   
        }

        /// <summary>
        /// Constructs a proof token based on RSA key.
        /// </summary>
        /// <param name="rsaAlgorithm"></param>
        public AsymmetricProofDescriptor( RSA rsaAlgorithm )
        {
            if ( rsaAlgorithm == null )
            {
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull( "rsaAlgorithm" );
            }

            _keyIdentifier = new SecurityKeyIdentifier(new RsaKeyIdentifierClause(rsaAlgorithm));
        }

        /// <summary>
        /// Constructs a proof token based on key identifier.
        /// </summary>
        /// <param name="keyIdentifier"></param>
        public AsymmetricProofDescriptor( SecurityKeyIdentifier keyIdentifier )
        {
            if ( keyIdentifier == null )
            {
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull( "keyIdentifier" );
            }
            //
            // This is a key identifier for an asymmetric key
            //
            _keyIdentifier = keyIdentifier;
        }

        #region ProofDescriptor Overrides

        /// <summary>
        /// Basically nothing to write into the RSTR's requested proof token.
        /// </summary>
        /// <param name="response"></param>
        public override void ApplyTo( RSTR response )
        {
            if ( response == null )
            {
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull( "response" );
            }
            //
            // Nothing else to do for an asymmetric key
            //
        }

        /// <summary>
        /// This is the key identifier that the requestor has provided from the use key.
        /// This can be echo back inside the saml token if needed. This would be either 
        /// </summary>
        public override SecurityKeyIdentifier KeyIdentifier
        {
            get { return _keyIdentifier; }
        }

        #endregion
    }
}