// Decompiled with JetBrains decompiler
// Type: Microsoft.InfoCards.TransformFinalBlockRequest
// Assembly: infocard, Version=3.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
// MVID: 1D4D5564-A025-490C-AF1D-DF4FBB709D1F
// Assembly location: C:\Users\Administrateur\Downloads\Virusshare-00001-msil\Virus.Win32.Expiro.w-f8f9f26e940480624825f6bddbea86e70fc4aa746c4dd8efa7d98dcb477000ed.exe

using Microsoft.InfoCards.Diagnostics;
using System;
using System.Diagnostics;
using System.IO;
using System.Security.Principal;

namespace Microsoft.InfoCards
{
  internal class TransformFinalBlockRequest : ClientRequest
  {
    private int m_cryptoSession;
    private byte[] m_inBlock;
    private byte[] m_outBlock;

    public TransformFinalBlockRequest(
      Process callingProcess,
      WindowsIdentity callingIdentity,
      IntPtr rpcHandle,
      Stream inArgs,
      Stream outArgs)
      : base(callingProcess, callingIdentity, rpcHandle, inArgs, outArgs)
    {
    }

    protected override void OnMarshalInArgs()
    {
      BinaryReader binaryReader = (BinaryReader) new InfoCardBinaryReader(this.InArgs);
      this.m_cryptoSession = binaryReader.ReadInt32();
      int count = binaryReader.ReadInt32();
      this.m_inBlock = binaryReader.ReadBytes(count);
      InfoCardTrace.ThrowInvalidArgumentConditional(0 == this.m_cryptoSession, "cryptoSession");
      InfoCardTrace.ThrowInvalidArgumentConditional(this.m_inBlock == null || 0 == this.m_inBlock.Length, "inBlock");
    }

    protected override void OnProcess()
    {
      try
      {
        this.m_outBlock = ((TransformCryptoSession) CryptoSession.Find(this.m_cryptoSession, this.CallerPid, this.RequestorIdentity.User)).TransformFinalBlock(this.m_inBlock);
      }
      finally
      {
        Array.Clear((Array) this.m_inBlock, 0, this.m_inBlock.Length);
      }
    }

    protected override void OnMarshalOutArgs() => Utility.SerializeBytes(new BinaryWriter(this.OutArgs), this.m_outBlock);
  }
}