File: System\IdentityModel\Protocols\WSTrust\RequestedProofToken.cs
Project: ndp\cdf\src\WCF\IdentityModel\System.IdentityModel.csproj (System.IdentityModel)
//-----------------------------------------------------------------------
// <copyright file="RequestedProofToken.cs" company="Microsoft">
//     Copyright (c) Microsoft Corporation.  All rights reserved.
// </copyright>
//-----------------------------------------------------------------------
 
namespace System.IdentityModel.Protocols.WSTrust
{
    using System.IdentityModel.Tokens;
 
    /// <summary>
    /// The content of a RequestedProofToken element could be EncryptedSecurityToken which means that EncryptedKey is used 
    /// under the RequestedProofToken. If the security token is a regular token, such as a SCT,
    /// then its session key will be the material which gets encrypted.  Another possibility is where
    /// we use combined entropy, then RequestedProofToken will only contain a ComputedKey element.
    /// </summary>
    public class RequestedProofToken
    {
        string _computedKeyAlgorithm;
        ProtectedKey _keys;
 
        /// <summary>
        /// In case of combined entropy, construct a requestedprooftoken 
        /// instance with computed key algorithm to specify the algorithm used to 
        /// calculate the session key.
        /// </summary>
        /// <param name="computedKeyAlgorithm">The algorithm used to computed the session key in 
        /// the combined entropy case.</param>
        public RequestedProofToken(string computedKeyAlgorithm)
            : base()
        {
            if (string.IsNullOrEmpty(computedKeyAlgorithm))
            {
                DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("computedKeyAlgorithm");
            }
 
            _computedKeyAlgorithm = computedKeyAlgorithm;
        }
 
        /// <summary>
        /// When the requested proof token contains real key in plain text.
        /// </summary>
        /// <param name="secret">The key material.</param>
        public RequestedProofToken(byte[] secret)
        {
            _keys = new ProtectedKey(secret);
        }
 
        /// <summary>
        /// When the requested proof token contains real key encrypted.
        /// </summary>
        /// <param name="secret">The key material.</param>
        /// <param name="wrappingCredentials">The encrypting credentials to encrypt the key material.</param>
        public RequestedProofToken(byte[] secret, EncryptingCredentials wrappingCredentials)
        {
            _keys = new ProtectedKey(secret, wrappingCredentials);
        }
 
        /// <summary>
        /// Constructs a requested proof token instance with the protected key.
        /// </summary>
        /// <param name="protectedKey">The protected key which can be either binary secret or encrypted key.</param>
        public RequestedProofToken(ProtectedKey protectedKey)
        {
            if (protectedKey == null)
            {
                throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("protectedKey");
            }
 
            _keys = protectedKey;
        }
 
        /// <summary>
        /// Gets the computed key algorithm used to calculate the session key in the combined 
        /// entropy case.
        /// </summary>
        public string ComputedKeyAlgorithm
        {
            get
            {
                return _computedKeyAlgorithm;
            }
        }
 
        /// <summary>
        /// In the case when the requested proof token contains the real key, 
        /// ProtectedKey getter will returns the real key bytes either encrypted
        /// or plaintext.
        /// </summary>
        public ProtectedKey ProtectedKey
        {
            get
            {
                return _keys;
            }
        }
    }
}