System\Net\NegotiateAuthenticationPal.ManagedNtlm.cs (23)
750if (signature.Length != SignatureLength ||
758Span<byte> expectedSignature = stackalloc byte[SignatureLength];
771Span<byte> signatureBuffer = signature.GetSpan(SignatureLength);
774signature.Advance(SignatureLength);
784Span<byte> output = outputWriter.GetSpan(input.Length + SignatureLength);
785_clientSeal.Transform(input, output.Slice(SignatureLength, input.Length));
786CalculateSignature(input, _clientSequenceNumber, _clientSigningKey, _clientSeal, output.Slice(0, SignatureLength));
790outputWriter.Advance(input.Length + SignatureLength);
804if (input.Length < SignatureLength)
809Span<byte> output = outputWriter.GetSpan(input.Length - SignatureLength);
810_serverSeal.Transform(input.Slice(SignatureLength), output.Slice(0, input.Length - SignatureLength));
811if (!VerifyMIC(output.Slice(0, input.Length - SignatureLength), input.Slice(0, SignatureLength)))
817outputWriter.Advance(input.Length - SignatureLength);
825unwrappedOffset = SignatureLength;
826unwrappedLength = input.Length - SignatureLength;
833if (input.Length < SignatureLength)
838_serverSeal.Transform(input.Slice(SignatureLength), input.Slice(SignatureLength));
839if (!VerifyMIC(input.Slice(SignatureLength), input.Slice(0, SignatureLength)))
841CryptographicOperations.ZeroMemory(input.Slice(SignatureLength));