// Decompiled with JetBrains decompiler // Type: Microsoft.InfoCards.InfoCardServiceClientCredentials // Assembly: infocard, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 // MVID: ADE0A079-11DB-4A46-8BDE-D2A592CA8DEA // Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00000-msil\Virus.Win32.Expiro.w-67b630ead60119692b9abbdfd8717c96904ef041127c2cae033c86b718eaa61e.exe using Microsoft.InfoCards.Diagnostics; using System; using System.IdentityModel.Selectors; using System.IdentityModel.Tokens; using System.ServiceModel; using System.ServiceModel.Description; using System.ServiceModel.Dispatcher; using System.ServiceModel.Security.Tokens; namespace Microsoft.InfoCards { internal class InfoCardServiceClientCredentials : ClientCredentials { private InfoCard m_card; private TokenFactoryCredential m_credentials; private bool m_isSelfIssued; private ProtocolProfile m_protocolProfile; private RSATokenProvider m_endorsingSigTokenProvider; public InfoCardServiceClientCredentials(TokenFactoryCredential creds, ProtocolProfile profile) { this.m_credentials = creds; this.m_protocolProfile = profile; } public InfoCardServiceClientCredentials( InfoCardServiceClientCredentials other, ProtocolProfile profile) : base((ClientCredentials) other) { this.m_credentials = other.m_credentials; this.m_endorsingSigTokenProvider = other.m_endorsingSigTokenProvider; this.m_protocolProfile = profile; } public InfoCard SelectedCard { get => this.m_card; set => this.m_card = value; } public bool IsSelfIssuedCred { get => this.m_isSelfIssued; set => this.m_isSelfIssued = value; } public RSATokenProvider EndorsingSignatureTokenProvider { get => this.m_endorsingSigTokenProvider; set => this.m_endorsingSigTokenProvider = value; } public ProtocolProfile ProtocolVersionProfile => this.m_protocolProfile; protected override ClientCredentials CloneCore() => (ClientCredentials) new InfoCardServiceClientCredentials(this, this.m_protocolProfile); public override void ApplyClientBehavior( ServiceEndpoint serviceEndpoint, ClientRuntime behavior) { } public override SecurityTokenManager CreateSecurityTokenManager() => (SecurityTokenManager) new InfoCardServiceClientCredentials.InfoCardServiceClientCredentialsSecurityTokenManager(this); private class InfoCardServiceClientCredentialsSecurityTokenManager : ClientCredentialsSecurityTokenManager { private InfoCard m_card; private TokenFactoryCredential m_credentials; private ProtocolProfile m_protocolProfile; public InfoCardServiceClientCredentialsSecurityTokenManager( InfoCardServiceClientCredentials creds) : base((ClientCredentials) creds) { this.m_card = creds.SelectedCard; this.m_credentials = creds.m_credentials; this.m_protocolProfile = creds.ProtocolVersionProfile; } public override SecurityTokenProvider CreateSecurityTokenProvider( SecurityTokenRequirement tokenRequirement) { string str = tokenRequirement != null ? tokenRequirement.TokenType : throw InfoCardTrace.ThrowHelperArgumentNull(nameof (tokenRequirement)); bool flag = null != ((InfoCardServiceClientCredentials) this.ClientCredentials).EndorsingSignatureTokenProvider; if (this.IsIssuedSecurityTokenRequirement(tokenRequirement)) { if (this.m_credentials.CredentialType != TokenFactoryCredentialType.SelfIssuedCredential) throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("CardDoesNotMatchRequiredAuthType"))); IssuedSecurityTokenParameters property1 = tokenRequirement.GetProperty(ServiceModelSecurityTokenRequirement.IssuedSecurityTokenParametersProperty); EndpointAddress property2 = tokenRequirement.GetProperty(ServiceModelSecurityTokenRequirement.TargetAddressProperty); if (property1.IssuerAddress != (EndpointAddress) null && Utility.CompareUri(property1.IssuerAddress.Uri, XmlNames.WSIdentity.SelfIssuerUriValue)) return (SecurityTokenProvider) new CustomTokenProvider(property1, this.m_card, property2, ((InfoCardServiceClientCredentials) this.ClientCredentials).IsSelfIssuedCred, this.m_protocolProfile); throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("InvalidIssuerForIssuedToken"))); } if (str == SecurityTokenTypes.X509Certificate) { if (tokenRequirement.KeyUsage != SecurityKeyUsage.Signature) return base.CreateSecurityTokenProvider(tokenRequirement); if (this.m_credentials.CredentialType != TokenFactoryCredentialType.X509CertificateCredential) throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("CardDoesNotMatchRequiredAuthType"))); return (SecurityTokenProvider) new RemoteCryptoTokenProvider(this.ClientCredentials.ClientCertificate.Certificate); } if (str == ServiceModelSecurityTokenTypes.MutualSslnego) { if (this.m_credentials.CredentialType != TokenFactoryCredentialType.X509CertificateCredential) throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("CardDoesNotMatchRequiredAuthType"))); return base.CreateSecurityTokenProvider(tokenRequirement); } if (str == ServiceModelSecurityTokenTypes.AnonymousSslnego) return base.CreateSecurityTokenProvider(tokenRequirement); if (str == ServiceModelSecurityTokenTypes.SecureConversation) return base.CreateSecurityTokenProvider(tokenRequirement); if (str == SecurityTokenTypes.Kerberos || str == ServiceModelSecurityTokenTypes.Spnego) { if (this.m_credentials.CredentialType != TokenFactoryCredentialType.KerberosCredential) throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("CardDoesNotMatchRequiredAuthType"))); return base.CreateSecurityTokenProvider(tokenRequirement); } if (str == SecurityTokenTypes.UserName) { if (this.m_credentials.CredentialType != TokenFactoryCredentialType.UserNamePasswordCredential) throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("CardDoesNotMatchRequiredAuthType"))); return base.CreateSecurityTokenProvider(tokenRequirement); } if (str == ServiceModelSecurityTokenTypes.SspiCredential) { if (this.m_credentials.CredentialType != TokenFactoryCredentialType.KerberosCredential && this.m_credentials.CredentialType != TokenFactoryCredentialType.UserNamePasswordCredential) throw InfoCardTrace.ThrowHelperError((Exception) new TokenCreationException(SR.GetString("CardDoesNotMatchRequiredAuthType"))); return base.CreateSecurityTokenProvider(tokenRequirement); } return str == SecurityTokenTypes.Rsa && flag ? (SecurityTokenProvider) ((InfoCardServiceClientCredentials) this.ClientCredentials).EndorsingSignatureTokenProvider : base.CreateSecurityTokenProvider(tokenRequirement); } } } }