System\Net\NegotiateAuthenticationPal.ManagedNtlm.cs (23)
789if (signature.Length != SignatureLength ||
797Span<byte> expectedSignature = stackalloc byte[SignatureLength];
810Span<byte> signatureBuffer = signature.GetSpan(SignatureLength);
813signature.Advance(SignatureLength);
823Span<byte> output = outputWriter.GetSpan(input.Length + SignatureLength);
824_clientSeal.Transform(input, output.Slice(SignatureLength, input.Length));
825CalculateSignature(input, _clientSequenceNumber, _clientSigningKey, _clientSeal, output.Slice(0, SignatureLength));
829outputWriter.Advance(input.Length + SignatureLength);
843if (input.Length < SignatureLength)
848Span<byte> output = outputWriter.GetSpan(input.Length - SignatureLength);
849_serverSeal.Transform(input.Slice(SignatureLength), output.Slice(0, input.Length - SignatureLength));
850if (!VerifyMIC(output.Slice(0, input.Length - SignatureLength), input.Slice(0, SignatureLength)))
856outputWriter.Advance(input.Length - SignatureLength);
864unwrappedOffset = SignatureLength;
865unwrappedLength = input.Length - SignatureLength;
872if (input.Length < SignatureLength)
877_serverSeal.Transform(input.Slice(SignatureLength), input.Slice(SignatureLength));
878if (!VerifyMIC(input.Slice(SignatureLength), input.Slice(0, SignatureLength)))
880CryptographicOperations.ZeroMemory(input.Slice(SignatureLength));