Lines Matching refs:MAC

142          * Since MAC's doFinal() is called for every SSL/TLS packet, it's
143 * not necessary to do the same with MAC's.
387 (authenticator instanceof MAC) ? ((MAC)authenticator).MAClen() : 0;
410 // so we just send bad record MAC. We also need to make
411 // sure to always check the MAC to avoid a timing attack
422 if ((authenticator instanceof MAC) && (tagLen != 0)) {
423 MAC signer = (MAC)authenticator;
426 // Note that although it is not necessary, we run the same MAC
435 // set offset of the dummy MAC
440 // Run MAC computation and comparison on the payload.
442 // MAC data would be stripped off during the check.
445 reservedBPE = new BadPaddingException("bad record MAC");
449 // Run MAC computation and comparison on the remainder.
452 // constant time of MAC computation and comparison on each record.
458 // hash algorithm of the MAC) than the cipheredLength.
467 // check MAC tag on. We start the check from the header of the
482 * Run MAC computation and comparison
486 MAC signer, byte[] sequence, boolean isSimulated) {
496 // Something is wrong with MAC implementation.
497 throw new RuntimeException("Internal MAC error");
513 * A constant-time comparison of the MAC tags.
537 * Run MAC computation and comparison
542 int offset, int contentLen, MAC signer, boolean isSimulated) {
548 // Something is wrong with MAC implementation.
549 throw new RuntimeException("Internal MAC error");
557 * A constant-time comparison of the MAC tags.
582 * Calculate the length of a dummy buffer to run MAC computation
588 MAC signer, int fullLen, int usedLen) {
603 // not impact the overall MAC compression function evaluations.