DerivedKeySecurityToken.cs source code in C# .NET

Source code for the .NET framework in C#

                        

Code:

/ WCF / WCF / 3.5.30729.1 / untmp / Orcas / SP / ndp / cdf / src / WCF / ServiceModel / System / ServiceModel / Security / Tokens / DerivedKeySecurityToken.cs / 1 / DerivedKeySecurityToken.cs

                            //------------------------------------------------------------ 
// Copyright (c) Microsoft Corporation.  All rights reserved.
//-----------------------------------------------------------

namespace System.ServiceModel.Security.Tokens 
{
    using System.Collections; 
    using System.ServiceModel; 
    using System.Collections.Generic;
    using System.Collections.ObjectModel; 
    using System.Globalization;
    using System.IO;
    using System.IdentityModel.Claims;
    using System.IdentityModel.Policy; 
    using System.IdentityModel.Tokens;
    using System.IdentityModel.Selectors; 
    using System.Security.Cryptography; 
    using System.Text;
    using System.Xml; 


    sealed class DerivedKeySecurityToken : SecurityToken
    { 
        //        public const string DefaultLabel = "WS-SecureConversationWS-SecureConversation";
        static readonly byte[] DefaultLabel = new byte[] 
            { 
                (byte)'W',(byte)'S',(byte)'-',(byte)'S',(byte)'e',(byte)'c',(byte)'u',(byte)'r',(byte)'e',
                (byte)'C',(byte)'o',(byte)'n',(byte)'v',(byte)'e',(byte)'r',(byte)'s',(byte)'a',(byte)'t',(byte)'i',(byte)'o',(byte)'n', 
                (byte)'W',(byte)'S',(byte)'-',(byte)'S',(byte)'e',(byte)'c',(byte)'u',(byte)'r',(byte)'e',
                (byte)'C',(byte)'o',(byte)'n',(byte)'v',(byte)'e',(byte)'r',(byte)'s',(byte)'a',(byte)'t',(byte)'i',(byte)'o',(byte)'n'
            };
 
        public const int DefaultNonceLength = 16;
        public const int DefaultDerivedKeyLength = 32; 
 
        string id;
        byte[] key; 
        string keyDerivationAlgorithm;
        string label;
        int length = -1;
        byte[] nonce; 
        // either offset or generation must be specified.
        int offset = -1; 
        int generation = -1; 
        SecurityToken tokenToDerive;
        SecurityKeyIdentifierClause tokenToDeriveIdentifier; 
        ReadOnlyCollection securityKeys;

        // create from scratch
        public DerivedKeySecurityToken(SecurityToken tokenToDerive, SecurityKeyIdentifierClause tokenToDeriveIdentifier, int length) 
            : this(tokenToDerive, tokenToDeriveIdentifier, length, SecurityUtils.GenerateId())
        { 
        } 

        internal DerivedKeySecurityToken(SecurityToken tokenToDerive, SecurityKeyIdentifierClause tokenToDeriveIdentifier, 
            int length, string id)
        {
            if (length != 16 && length != 24 && length != 32)
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperError(new ArgumentException(SR.GetString(SR.Psha1KeyLengthInvalid, length * 8))); 

            byte[] nonce = new byte[DefaultNonceLength]; 
            RNGCryptoServiceProvider rng = new RNGCryptoServiceProvider(); 
            rng.GetBytes(nonce);
 
            Initialize(id, -1, 0, length, null, nonce, tokenToDerive, tokenToDeriveIdentifier, SecurityAlgorithms.Psha1KeyDerivation);
        }

        internal DerivedKeySecurityToken(int generation, int offset, int length, 
            string label, int minNonceLength, SecurityToken tokenToDerive,
            SecurityKeyIdentifierClause tokenToDeriveIdentifier, 
            string derivationAlgorithm, string id) 
        {
            byte[] nonce = new byte[minNonceLength]; 
            RNGCryptoServiceProvider rng = new RNGCryptoServiceProvider();
            rng.GetBytes(nonce);

            Initialize(id, generation, offset, length, label, nonce, tokenToDerive, tokenToDeriveIdentifier, derivationAlgorithm); 
        }
 
        // create from xml 
        internal DerivedKeySecurityToken(int generation, int offset, int length,
            string label, byte[] nonce, SecurityToken tokenToDerive, 
            SecurityKeyIdentifierClause tokenToDeriveIdentifier, string derivationAlgorithm, string id)
        {
            Initialize(id, generation, offset, length, label, nonce, tokenToDerive, tokenToDeriveIdentifier, derivationAlgorithm, false);
        } 

        public override string Id 
        { 
            get { return this.id; }
        } 

        public override DateTime ValidFrom
        {
            get { return this.tokenToDerive.ValidFrom; } 
        }
 
        public override DateTime ValidTo 
        {
            get { return this.tokenToDerive.ValidTo; } 
        }

        public string KeyDerivationAlgorithm
        { 
            get { return keyDerivationAlgorithm; }
        } 
 
        public int Generation
        { 
            get { return this.generation; }
        }

        public string Label 
        {
            get { return this.label; } 
        } 

        public int Length 
        {
            get { return this.length; }
        }
 
        internal byte[] Nonce
        { 
            get { return this.nonce; } 
        }
 
        public int Offset
        {
            get { return this.offset; }
        } 

        internal SecurityToken TokenToDerive 
        { 
            get { return this.tokenToDerive; }
        } 

        internal SecurityKeyIdentifierClause TokenToDeriveIdentifier
        {
            get { return this.tokenToDeriveIdentifier; } 
        }
 
        public override ReadOnlyCollection SecurityKeys 
        {
            get 
            {
                if (this.securityKeys == null)
                {
#pragma warning suppress 56503 // 
                    throw DiagnosticUtility.ExceptionUtility.ThrowHelperError(new InvalidOperationException(SR.GetString(SR.DerivedKeyNotInitialized)));
                } 
                return this.securityKeys; 
            }
        } 

        public byte[] GetKeyBytes()
        {
            return SecurityUtils.CloneBuffer(this.key); 
        }
 
        public byte[] GetNonce() 
        {
            return SecurityUtils.CloneBuffer(this.nonce); 
        }

        internal bool TryGetSecurityKeys(out ReadOnlyCollection keys)
        { 
            keys = this.securityKeys;
            return (keys != null); 
        } 

        public override string ToString() 
        {
            StringWriter writer = new StringWriter(CultureInfo.InvariantCulture);
            writer.WriteLine("DerivedKeySecurityToken:");
            writer.WriteLine("   Generation: {0}", this.Generation); 
            writer.WriteLine("   Offset: {0}", this.Offset);
            writer.WriteLine("   Length: {0}", this.Length); 
            writer.WriteLine("   Label: {0}", this.Label); 
            writer.WriteLine("   Nonce: {0}", Convert.ToBase64String(this.Nonce));
            writer.WriteLine("   TokenToDeriveFrom:"); 
            using (XmlTextWriter xmlWriter = new XmlTextWriter(writer))
            {
                xmlWriter.Formatting = Formatting.Indented;
                SecurityStandardsManager.DefaultInstance.SecurityTokenSerializer.WriteKeyIdentifierClause(XmlDictionaryWriter.CreateDictionaryWriter(xmlWriter), this.TokenToDeriveIdentifier); 
            }
            return writer.ToString(); 
        } 

        void Initialize(string id, int generation, int offset, int length, string label, byte[] nonce, 
            SecurityToken tokenToDerive, SecurityKeyIdentifierClause tokenToDeriveIdentifier, string derivationAlgorithm)
        {
            Initialize(id, generation, offset, length, label, nonce, tokenToDerive, tokenToDeriveIdentifier, derivationAlgorithm, true);
        } 

        void Initialize(string id, int generation, int offset, int length, string label, byte[] nonce, 
            SecurityToken tokenToDerive, SecurityKeyIdentifierClause tokenToDeriveIdentifier, string derivationAlgorithm, 
            bool initializeDerivedKey)
        { 
            if (id == null)
            {
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("id");
            } 
            if (tokenToDerive == null)
            { 
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("tokenToDerive"); 
            }
            if (tokenToDeriveIdentifier == null) 
            {
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("tokentoDeriveIdentifier");
            }
            if (!SecurityUtils.IsSupportedAlgorithm(derivationAlgorithm, tokenToDerive)) 
            {
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperError(new ArgumentException(SR.GetString(SR.DerivedKeyCannotDeriveFromSecret))); 
            } 
            if (nonce == null)
            { 
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("nonce");
            }
            if (length == -1)
            { 
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperError(new ArgumentOutOfRangeException("length"));
            } 
            if (offset == -1 && generation == -1) 
            {
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgument(SR.GetString(SR.DerivedKeyPosAndGenNotSpecified)); 
            }
            if (offset >= 0 && generation >= 0)
            {
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgument(SR.GetString(SR.DerivedKeyPosAndGenBothSpecified)); 
            }
 
            this.id = id; 
            this.label = label;
            this.nonce = nonce; 
            this.length = length;
            this.offset = offset;
            this.generation = generation;
            this.tokenToDerive = tokenToDerive; 
            this.tokenToDeriveIdentifier = tokenToDeriveIdentifier;
            this.keyDerivationAlgorithm = derivationAlgorithm; 
 
            if (initializeDerivedKey)
            { 
                InitializeDerivedKey(this.length);
            }
        }
 
        internal void InitializeDerivedKey(int maxKeyLength)
        { 
            if (this.key != null) 
            {
                return; 
            }
            if (this.length > maxKeyLength)
            {
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgument(SR.GetString(SR.DerivedKeyLengthTooLong, this.length, maxKeyLength)); 
            }
 
            this.key = SecurityUtils.GenerateDerivedKey(this.tokenToDerive, this.keyDerivationAlgorithm, 
                (this.label != null ? Encoding.UTF8.GetBytes(this.label) : DefaultLabel), this.nonce, this.length * 8,
                ((this.offset >= 0) ? this.offset : this.generation * this.length)); 
            if ((this.key == null) || (this.key.Length == 0))
            {
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgument(SR.GetString(SR.DerivedKeyCannotDeriveFromSecret));
            } 
            List temp = new List(1);
            temp.Add(new InMemorySymmetricSecurityKey(this.key, false)); 
            this.securityKeys = temp.AsReadOnly(); 
        }
 
        internal void InitializeDerivedKey(ReadOnlyCollection securityKeys)
        {
            this.key = ((SymmetricSecurityKey)securityKeys[0]).GetSymmetricKey();
            this.securityKeys = securityKeys; 
        }
 
        internal static void EnsureAcceptableOffset(int offset, int generation, int length, int maxOffset) 
        {
            if (offset != -1) 
            {
                if (offset > maxOffset)
                {
                    throw DiagnosticUtility.ExceptionUtility.ThrowHelperWarning(new MessageSecurityException(SR.GetString(SR.DerivedKeyTokenOffsetTooHigh, offset, maxOffset))); 
                }
            } 
            else 
            {
                int effectiveOffset = generation * length; 
                if ((effectiveOffset < generation && effectiveOffset < length) || effectiveOffset > maxOffset)
                {
                    throw DiagnosticUtility.ExceptionUtility.ThrowHelperWarning(new MessageSecurityException(SR.GetString(SR.DerivedKeyTokenGenerationAndLengthTooHigh, generation, length, maxOffset)));
                } 
            }
        } 
    } 
}

// File provided for Reference Use Only by Microsoft Corporation (c) 2007.
// Copyright (c) Microsoft Corporation. All rights reserved.


                        

Link Menu

Network programming in C#, Network Programming in VB.NET, Network Programming in .NET
This book is available now!
Buy at Amazon US or
Buy at Amazon UK