System\Net\NegotiateAuthenticationPal.ManagedNtlm.cs (23)
735if (signature.Length != SignatureLength ||
743Span<byte> expectedSignature = stackalloc byte[SignatureLength];
756Span<byte> signatureBuffer = signature.GetSpan(SignatureLength);
759signature.Advance(SignatureLength);
769Span<byte> output = outputWriter.GetSpan(input.Length + SignatureLength);
770_clientSeal.Transform(input, output.Slice(SignatureLength, input.Length));
771CalculateSignature(input, _clientSequenceNumber, _clientSigningKey, _clientSeal, output.Slice(0, SignatureLength));
775outputWriter.Advance(input.Length + SignatureLength);
789if (input.Length < SignatureLength)
794Span<byte> output = outputWriter.GetSpan(input.Length - SignatureLength);
795_serverSeal.Transform(input.Slice(SignatureLength), output.Slice(0, input.Length - SignatureLength));
796if (!VerifyMIC(output.Slice(0, input.Length - SignatureLength), input.Slice(0, SignatureLength)))
802outputWriter.Advance(input.Length - SignatureLength);
810unwrappedOffset = SignatureLength;
811unwrappedLength = input.Length - SignatureLength;
818if (input.Length < SignatureLength)
823_serverSeal.Transform(input.Slice(SignatureLength), input.Slice(SignatureLength));
824if (!VerifyMIC(input.Slice(SignatureLength), input.Slice(0, SignatureLength)))
826CryptographicOperations.ZeroMemory(input.Slice(SignatureLength));