MalwareSourceCode/MSIL/Virus/Win32/E/Virus.Win32.Expiro.w-1f15ee7e9f7da02b6bfb4c5a5e6484eb9fa71b82d3699c54bcc7a31794b4a66d/Microsoft/InfoCards/InfoCardServiceClientCredentials.cs

144 lines
7.3 KiB
C#
Raw Normal View History

2022-08-18 11:28:56 +00:00
// Decompiled with JetBrains decompiler
// Type: Microsoft.InfoCards.InfoCardServiceClientCredentials
// Assembly: infocard, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
// MVID: ADE0A079-11DB-4A46-8BDE-D2A592CA8DEA
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Virus.Win32.Expiro.w-1f15ee7e9f7da02b6bfb4c5a5e6484eb9fa71b82d3699c54bcc7a31794b4a66d.exe
using Microsoft.InfoCards.Diagnostics;
using System;
using System.IdentityModel.Selectors;
using System.IdentityModel.Tokens;
using System.ServiceModel;
using System.ServiceModel.Description;
using System.ServiceModel.Dispatcher;
using System.ServiceModel.Security.Tokens;
namespace Microsoft.InfoCards
{
internal class InfoCardServiceClientCredentials : ClientCredentials
{
private InfoCard m_card;
private TokenFactoryCredential m_credentials;
private bool m_isSelfIssued;
private ProtocolProfile m_protocolProfile;
private RSATokenProvider m_endorsingSigTokenProvider;
public InfoCardServiceClientCredentials(TokenFactoryCredential creds, ProtocolProfile profile)
{
this.m_credentials = creds;
this.m_protocolProfile = profile;
}
public InfoCardServiceClientCredentials(
InfoCardServiceClientCredentials other,
ProtocolProfile profile)
: base((ClientCredentials) other)
{
this.m_credentials = other.m_credentials;
this.m_endorsingSigTokenProvider = other.m_endorsingSigTokenProvider;
this.m_protocolProfile = profile;
}
public InfoCard SelectedCard
{
get => this.m_card;
set => this.m_card = value;
}
public bool IsSelfIssuedCred
{
get => this.m_isSelfIssued;
set => this.m_isSelfIssued = value;
}
public RSATokenProvider EndorsingSignatureTokenProvider
{
get => this.m_endorsingSigTokenProvider;
set => this.m_endorsingSigTokenProvider = value;
}
public ProtocolProfile ProtocolVersionProfile => this.m_protocolProfile;
protected override ClientCredentials CloneCore() => (ClientCredentials) new InfoCardServiceClientCredentials(this, this.m_protocolProfile);
public override void ApplyClientBehavior(
ServiceEndpoint serviceEndpoint,
ClientRuntime behavior)
{
}
public override SecurityTokenManager CreateSecurityTokenManager() => (SecurityTokenManager) new InfoCardServiceClientCredentials.InfoCardServiceClientCredentialsSecurityTokenManager(this);
private class InfoCardServiceClientCredentialsSecurityTokenManager :
ClientCredentialsSecurityTokenManager
{
private InfoCard m_card;
private TokenFactoryCredential m_credentials;
private ProtocolProfile m_protocolProfile;
public InfoCardServiceClientCredentialsSecurityTokenManager(
InfoCardServiceClientCredentials creds)
: base((ClientCredentials) creds)
{
this.m_card = creds.SelectedCard;
this.m_credentials = creds.m_credentials;
this.m_protocolProfile = creds.ProtocolVersionProfile;
}
public override SecurityTokenProvider CreateSecurityTokenProvider(
SecurityTokenRequirement tokenRequirement)
{
string str = tokenRequirement != null ? tokenRequirement.TokenType : throw InfoCardTrace.ThrowHelperArgumentNull(nameof (tokenRequirement));
bool flag = null != ((InfoCardServiceClientCredentials) this.ClientCredentials).EndorsingSignatureTokenProvider;
if (this.IsIssuedSecurityTokenRequirement(tokenRequirement))
{
if (this.m_credentials.CredentialType != TokenFactoryCredentialType.SelfIssuedCredential)
throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("CardDoesNotMatchRequiredAuthType")));
IssuedSecurityTokenParameters property1 = tokenRequirement.GetProperty<IssuedSecurityTokenParameters>(ServiceModelSecurityTokenRequirement.IssuedSecurityTokenParametersProperty);
EndpointAddress property2 = tokenRequirement.GetProperty<EndpointAddress>(ServiceModelSecurityTokenRequirement.TargetAddressProperty);
if (property1.IssuerAddress != (EndpointAddress) null && Utility.CompareUri(property1.IssuerAddress.Uri, XmlNames.WSIdentity.SelfIssuerUriValue))
return (SecurityTokenProvider) new CustomTokenProvider(property1, this.m_card, property2, ((InfoCardServiceClientCredentials) this.ClientCredentials).IsSelfIssuedCred, this.m_protocolProfile);
throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("InvalidIssuerForIssuedToken")));
}
if (str == SecurityTokenTypes.X509Certificate)
{
if (tokenRequirement.KeyUsage != SecurityKeyUsage.Signature)
return base.CreateSecurityTokenProvider(tokenRequirement);
if (this.m_credentials.CredentialType != TokenFactoryCredentialType.X509CertificateCredential)
throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("CardDoesNotMatchRequiredAuthType")));
return (SecurityTokenProvider) new RemoteCryptoTokenProvider(this.ClientCredentials.ClientCertificate.Certificate);
}
if (str == ServiceModelSecurityTokenTypes.MutualSslnego)
{
if (this.m_credentials.CredentialType != TokenFactoryCredentialType.X509CertificateCredential)
throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("CardDoesNotMatchRequiredAuthType")));
return base.CreateSecurityTokenProvider(tokenRequirement);
}
if (str == ServiceModelSecurityTokenTypes.AnonymousSslnego)
return base.CreateSecurityTokenProvider(tokenRequirement);
if (str == ServiceModelSecurityTokenTypes.SecureConversation)
return base.CreateSecurityTokenProvider(tokenRequirement);
if (str == SecurityTokenTypes.Kerberos || str == ServiceModelSecurityTokenTypes.Spnego)
{
if (this.m_credentials.CredentialType != TokenFactoryCredentialType.KerberosCredential)
throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("CardDoesNotMatchRequiredAuthType")));
return base.CreateSecurityTokenProvider(tokenRequirement);
}
if (str == SecurityTokenTypes.UserName)
{
if (this.m_credentials.CredentialType != TokenFactoryCredentialType.UserNamePasswordCredential)
throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("CardDoesNotMatchRequiredAuthType")));
return base.CreateSecurityTokenProvider(tokenRequirement);
}
if (str == ServiceModelSecurityTokenTypes.SspiCredential)
{
if (this.m_credentials.CredentialType != TokenFactoryCredentialType.KerberosCredential && this.m_credentials.CredentialType != TokenFactoryCredentialType.UserNamePasswordCredential)
throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("CardDoesNotMatchRequiredAuthType")));
return base.CreateSecurityTokenProvider(tokenRequirement);
}
return str == SecurityTokenTypes.Rsa && flag ? (SecurityTokenProvider) ((InfoCardServiceClientCredentials) this.ClientCredentials).EndorsingSignatureTokenProvider : base.CreateSecurityTokenProvider(tokenRequirement);
}
}
}
}