Version |
Insecure |
CryptoMisuse |
Rule name |
Method |
Statement |
Details |
0.1.23 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;Lcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r15.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r22.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer646, $r21, $r20) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer649, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r19.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer621, $r18, $r17) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer626, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt(Ljava/lang/String;)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer778, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r5.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r13.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer770, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r100.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1149, $r99, $r98) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1312) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer1320) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer1333) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer1340) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1347) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1357) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1372) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
virtualinvoke $r3.<javax.crypto.Mac: void init(java.security.Key)>(r6) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1377) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1391) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SecureRandom |
com.jcraft.jsch.jce.Random.<init>()V |
$r8 = staticinvoke <java.security.SecureRandom: java.security.SecureRandom getInstance(java.lang.String)>(varReplacer1392) |
First parameter (with value "IBMSecureRandom") should be any of {SHA1PRNG, Windows-PRNG, NativePRNG, NativePRNGBlocking, NativePRNGNonBlocking, PKCS11} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1397) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1407) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r15) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1415) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r18) |
First parameter was not properly generated as specced Key |
0.1.24 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;Lcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r15.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r22.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1112, $r21, $r20) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1125, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r19.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1109, $r18, $r17) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1100, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt(Ljava/lang/String;)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1155, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r5.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r13.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1151, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r100.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer364, $r99, $r98) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Mac |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r106.<com.jcraft.jsch.MAC: void init(byte[])>($r105) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to <javax.crypto.Mac: void init(java.security.Key)>, <javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)> |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer26) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer35) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer43) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer50) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer65) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer70) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer86) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer92) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer105) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SecureRandom |
com.jcraft.jsch.jce.Random.<init>()V |
$r8 = staticinvoke <java.security.SecureRandom: java.security.SecureRandom getInstance(java.lang.String)>(varReplacer107) |
First parameter (with value "IBMSecureRandom") should be any of {SHA1PRNG, Windows-PRNG, NativePRNG, NativePRNGBlocking, NativePRNGNonBlocking, PKCS11} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer111) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer121) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r15) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer128) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r18) |
First parameter was not properly generated as specced Key |
0.1.25 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;Lcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r15.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r5.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Mac |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r106.<com.jcraft.jsch.MAC: void init(byte[])>($r105) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to <javax.crypto.Mac: void init(java.security.Key)>, <javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)> |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1339) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer1351) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer1363) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r16, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer1366) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1381) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1386) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1401) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1411) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1421) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SecureRandom |
com.jcraft.jsch.jce.Random.<init>()V |
$r8 = staticinvoke <java.security.SecureRandom: java.security.SecureRandom getInstance(java.lang.String)>(varReplacer1422) |
First parameter (with value "IBMSecureRandom") should be any of {SHA1PRNG, Windows-PRNG, NativePRNG, NativePRNGBlocking, NativePRNGNonBlocking, PKCS11} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1427) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1437) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r15) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1442) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r18) |
First parameter was not properly generated as specced Key |
0.1.27 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;Lcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r15.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r22.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer656, $r21, $r20) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer654, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r19.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer624, $r18, $r17) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer637, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt(Ljava/lang/String;)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer782, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r5.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r13.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer779, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r100.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1174, $r99, $r98) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1350) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer1359) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer1368) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer1378) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1386) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
virtualinvoke $r3.<javax.crypto.Mac: void init(java.security.Key)>(r6) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1398) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1409) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1415) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1429) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SecureRandom |
com.jcraft.jsch.jce.Random.<init>()V |
$r8 = staticinvoke <java.security.SecureRandom: java.security.SecureRandom getInstance(java.lang.String)>(varReplacer1432) |
First parameter (with value "IBMSecureRandom") should be any of {SHA1PRNG, Windows-PRNG, NativePRNG, NativePRNGBlocking, NativePRNGNonBlocking, PKCS11} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1435) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1445) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r15) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1454) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r18) |
First parameter was not properly generated as specced Key |
0.1.29 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;Lcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r15.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r22.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1230, $r21, $r20) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1229, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r19.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1211, $r18, $r17) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1206, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1258, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r5.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r13.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1257, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r102.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer407, $r101, $r100) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Mac |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r109.<com.jcraft.jsch.MAC: void init(byte[])>($r108) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to <javax.crypto.Mac: void init(java.security.Key)>, <javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)> |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer29) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer32) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer47) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r16, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer55) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer62) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
virtualinvoke $r3.<javax.crypto.Mac: void init(java.security.Key)>(r6) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer73) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer87) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer92) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer107) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SecureRandom |
com.jcraft.jsch.jce.Random.<init>()V |
$r8 = staticinvoke <java.security.SecureRandom: java.security.SecureRandom getInstance(java.lang.String)>(varReplacer109) |
First parameter (with value "IBMSecureRandom") should be any of {SHA1PRNG, Windows-PRNG, NativePRNG, NativePRNGBlocking, NativePRNGNonBlocking, PKCS11} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer113) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer124) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r15) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer130) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r18) |
First parameter was not properly generated as specced Key |
0.1.31 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;[B[BLcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r17.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r22.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1435, $r21, $r20) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1432, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r19.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1411, $r18, $r17) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1419, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1475, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r5.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r14.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1468, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Mac |
com.jcraft.jsch.KnownHosts$HashedHostKey.hash()V |
interfaceinvoke r1.<com.jcraft.jsch.MAC: void doFinal(byte[],int)>($r9, varReplacer1560) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to init |
- |
- |
|
Mac |
com.jcraft.jsch.KnownHosts$HashedHostKey.isMatched(Ljava/lang/String;)Z |
interfaceinvoke r2.<com.jcraft.jsch.MAC: void doFinal(byte[],int)>(r4, varReplacer1553) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to init |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r100.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer486, $r99, $r98) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Mac |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r107.<com.jcraft.jsch.MAC: void init(byte[])>($r106) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to <javax.crypto.Mac: void init(java.security.Key)>, <javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)> |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer27) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer33) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer45) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r16, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r13) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r12, varReplacer53) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
virtualinvoke $r3.<javax.crypto.Mac: void init(java.security.Key)>(r6) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer62) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer70) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer87) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACSHA196.doFinal([BI)V |
virtualinvoke $r4.<javax.crypto.Mac: void doFinal(byte[],int)>($r3, varReplacer102) |
Unexpected call to method doFinal on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer96) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACSHA196.update([BII)V |
virtualinvoke $r2.<javax.crypto.Mac: void update(byte[],int,int)>(r1, i0, i1) |
Unexpected call to method update on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer107) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer111) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer122) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r15) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer132) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r18) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer174) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer181) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.38 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;[B[BLcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r17.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r22.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1498, $r21, $r20) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1495, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r19.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1486, $r18, $r17) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1468, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1534, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r5.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r14.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1529, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Mac |
com.jcraft.jsch.KnownHosts$HashedHostKey.hash()V |
interfaceinvoke r1.<com.jcraft.jsch.MAC: void doFinal(byte[],int)>($r9, varReplacer1616) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to init |
- |
- |
|
Mac |
com.jcraft.jsch.KnownHosts$HashedHostKey.isMatched(Ljava/lang/String;)Z |
interfaceinvoke r2.<com.jcraft.jsch.MAC: void doFinal(byte[],int)>(r4, varReplacer1610) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to init |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r100.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer529, $r99, $r98) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke r27.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer602, $r9, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Mac |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r107.<com.jcraft.jsch.MAC: void init(byte[])>($r106) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to <javax.crypto.Mac: void init(java.security.Key)>, <javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)> |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer104) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer110) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer121) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer126) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACMD5.doFinal([BI)V |
virtualinvoke $r3.<javax.crypto.Mac: void doFinal(byte[],int)>(r1, i0) |
Unexpected call to method doFinal on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer141) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACMD5.update([BII)V |
virtualinvoke $r2.<javax.crypto.Mac: void update(byte[],int,int)>(r1, i0, i1) |
Unexpected call to method update on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACMD596.doFinal([BI)V |
virtualinvoke $r4.<javax.crypto.Mac: void doFinal(byte[],int)>($r3, varReplacer153) |
Unexpected call to method doFinal on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer146) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACMD596.update([BII)V |
virtualinvoke $r2.<javax.crypto.Mac: void update(byte[],int,int)>(r1, i0, i1) |
Unexpected call to method update on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer159) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer171) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer183) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer187) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer198) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer205) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer83) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer90) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.41 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;[B[BLcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r19.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r21.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer830, $r20, $r19) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer842, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r18.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer817, $r17, $r16) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer811, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1019, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r6.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r14.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1015, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1582, $r4, $r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r77.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1498, $r76, $r75) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1742) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1751) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1758) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1767) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1782) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1788) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1796) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r8, varReplacer1797) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1806) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1807) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1815) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1811) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1821) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1832) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1845) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1854) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1866) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1878) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1882) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1893) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r3, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1903) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r3, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1909) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1933) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1940) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.42 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r16.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r9.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;[B[BLcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r17.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r22.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1787, $r21, $r20) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r22.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1787, $r21, $r20) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1785, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1785, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r19.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1767, $r18, $r17) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r19.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1767, $r18, $r17) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1755, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1755, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r5 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r12, $r4) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer931, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer931, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r4.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r14.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer927, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r14.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer927, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Mac |
com.jcraft.jsch.KnownHosts$HashedHostKey.hash()V |
interfaceinvoke r1.<com.jcraft.jsch.MAC: void doFinal(byte[],int)>($r9, varReplacer1029) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to init |
- |
- |
|
Mac |
com.jcraft.jsch.KnownHosts$HashedHostKey.isMatched(Ljava/lang/String;)Z |
interfaceinvoke r2.<com.jcraft.jsch.MAC: void doFinal(byte[],int)>(r4, varReplacer1021) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to init |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer715, $r3, $r4) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer715, $r3, $r4) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r100.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer632, $r99, $r98) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r100.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer632, $r99, $r98) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Mac |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r107.<com.jcraft.jsch.MAC: void init(byte[])>($r106) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to <javax.crypto.Mac: void init(java.security.Key)>, <javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)> |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer253) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer184) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer158) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer260) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer195) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer166) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer265) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r8, varReplacer268) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer123) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer128) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer114) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: void init(int,java.security.Key)>($b4, r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer113) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer148) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACMD5.doFinal([BI)V |
virtualinvoke $r3.<javax.crypto.Mac: void doFinal(byte[],int)>(r1, i0) |
Unexpected call to method doFinal on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer136) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACMD5.update([BII)V |
virtualinvoke $r2.<javax.crypto.Mac: void update(byte[],int,int)>(r1, i0, i1) |
Unexpected call to method update on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
virtualinvoke $r3.<javax.crypto.Mac: void init(java.security.Key)>(r6) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer103) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer210) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACSHA196.doFinal([BI)V |
virtualinvoke $r4.<javax.crypto.Mac: void doFinal(byte[],int)>($r3, varReplacer231) |
Unexpected call to method doFinal on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer225) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACSHA196.update([BII)V |
virtualinvoke $r2.<javax.crypto.Mac: void update(byte[],int,int)>(r1, i0, i1) |
Unexpected call to method update on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer151) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer141) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer202) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer216) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer175) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer49) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer90) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.45 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;[B[BLcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r19.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r21.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1953, $r20, $r19) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1961, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r18.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1951, $r17, $r16) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1943, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer219, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r6.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r14.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer215, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer637, $r4, $r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r77.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer537, $r76, $r75) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1427) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1469) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1373) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1441) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1456) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1489) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1381) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r8, varReplacer1380) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1346) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1342) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1315) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1313) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1408) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1430) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1390) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1411) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1351) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1450) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1385) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1307) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1479) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1326) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1041) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1039) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.46 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;[B[BLcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r140.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r21.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer2003, $r20, $r19) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1994, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r18.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1973, $r17, $r16) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1971, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer222, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r6.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r14.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer213, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Mac |
com.jcraft.jsch.KnownHosts$HashedHostKey.hash()V |
interfaceinvoke r1.<com.jcraft.jsch.MAC: void doFinal(byte[],int)>($r10, varReplacer1174) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to init |
- |
- |
|
Mac |
com.jcraft.jsch.KnownHosts$HashedHostKey.isMatched(Ljava/lang/String;)Z |
interfaceinvoke r2.<com.jcraft.jsch.MAC: void doFinal(byte[],int)>(r4, varReplacer1166) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to init |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer646, $r4, $r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r77.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer545, $r76, $r75) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Mac |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r85.<com.jcraft.jsch.MAC: void init(byte[])>($r84) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to <javax.crypto.Mac: void init(java.security.Key)>, <javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)> |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1454) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1500) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1401) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1480) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1489) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1518) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1412) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: void init(int,java.security.Key)>($b3, r9) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r8, varReplacer1411) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1374) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1375) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1350) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1347) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1441) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1463) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1426) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACSHA1.doFinal([BI)V |
virtualinvoke $r3.<javax.crypto.Mac: void doFinal(byte[],int)>(r1, i0) |
Unexpected call to method doFinal on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1447) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACSHA1.update([BII)V |
virtualinvoke $r2.<javax.crypto.Mac: void update(byte[],int,int)>(r1, i0, i1) |
Unexpected call to method update on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
virtualinvoke $r3.<javax.crypto.Mac: void init(java.security.Key)>(r6) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1388) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1483) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1418) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1339) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1508) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1361) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1071) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1069) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.47 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;[B[BLcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r140.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r21.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer2008, $r20, $r19) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer2002, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r18.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1992, $r17, $r16) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1993, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer226, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r6.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r14.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer225, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer651, $r4, $r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r77.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer553, $r76, $r75) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1470) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1509) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1411) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1484) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1496) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1531) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1425) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: void init(int,java.security.Key)>($b3, r9) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r8, varReplacer1424) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1390) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: void init(int,java.security.Key)>($b4, r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1391) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1361) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: void init(int,java.security.Key)>($b4, r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1360) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1446) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1473) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
virtualinvoke $r3.<javax.crypto.Mac: void init(java.security.Key)>(r6) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1437) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
virtualinvoke $r3.<javax.crypto.Mac: void init(java.security.Key)>(r6) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1454) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1398) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1493) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1428) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1350) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1520) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r3, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1370) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1081) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1079) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.48 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.IdentityFile.<init>(Ljava/lang/String;[B[BLcom/jcraft/jsch/JSch;)V |
interfaceinvoke $r140.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r21.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer2008, $r20, $r19) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_dss()Z |
interfaceinvoke $r29.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer2001, $r28, $r27) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r18.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1983, $r17, $r16) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.IdentityFile.decrypt_rsa()Z |
interfaceinvoke $r26.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer1988, $r25, $r24) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer230, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r7 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r6, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r6.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r14.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer225, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Mac |
com.jcraft.jsch.KnownHosts$HashedHostKey.hash()V |
interfaceinvoke r1.<com.jcraft.jsch.MAC: void doFinal(byte[],int)>($r10, varReplacer1187) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to init |
- |
- |
|
Mac |
com.jcraft.jsch.KnownHosts$HashedHostKey.isMatched(Ljava/lang/String;)Z |
interfaceinvoke r2.<com.jcraft.jsch.MAC: void doFinal(byte[],int)>(r4, varReplacer1177) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to init |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer654, $r4, $r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r77.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer563, $r76, $r75) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Mac |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r85.<com.jcraft.jsch.MAC: void init(byte[])>($r84) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to <javax.crypto.Mac: void init(java.security.Key)>, <javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)> |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1467) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1513) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1417) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1491) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1502) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1535) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1428) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r8, varReplacer1424) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1387) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1394) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1361) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
virtualinvoke $r7.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r3, varReplacer1362, varReplacer1363, r3, varReplacer1362) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1359) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1454) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD5.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1480) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACMD596.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1436) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACSHA1.doFinal([BI)V |
virtualinvoke $r3.<javax.crypto.Mac: void doFinal(byte[],int)>(r1, i0) |
Unexpected call to method doFinal on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA1.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1461) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACSHA1.update([BII)V |
virtualinvoke $r2.<javax.crypto.Mac: void update(byte[],int,int)>(r1, i0, i1) |
Unexpected call to method update on object of type javax.crypto.Mac. Expect a call to one of the following methods init |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
virtualinvoke $r3.<javax.crypto.Mac: void init(java.security.Key)>(r6) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMACSHA196.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer1401) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1496) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1431) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1353) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1524) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1372) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1084) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1082) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.49 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer230, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
$r13 = interfaceinvoke r4.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, <java.security.MessageDigest: byte[] digest()>, <java.security.MessageDigest: int digest(byte[],int,int)>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
r27 = interfaceinvoke $r15.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, <java.security.MessageDigest: byte[] digest()>, <java.security.MessageDigest: int digest(byte[],int,int)>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
r27 = interfaceinvoke $r19.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, <java.security.MessageDigest: byte[] digest()>, <java.security.MessageDigest: int digest(byte[],int,int)>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r4 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r3, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r6.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;)V |
interfaceinvoke $r14.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer228, r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Signature |
com.jcraft.jsch.KeyPairDSA.getVerifier()Lcom/jcraft/jsch/Signature; |
interfaceinvoke r1.<com.jcraft.jsch.SignatureDSA: void setPubKey(byte[],byte[],byte[],byte[])>($r19, $r20, $r21, $r22) |
Operation on object of type java.security.Signature object not completed. Expected call to initVerify, update, verify |
- |
- |
|
Signature |
com.jcraft.jsch.KeyPairRSA.getVerifier()Lcom/jcraft/jsch/Signature; |
interfaceinvoke r1.<com.jcraft.jsch.SignatureRSA: void setPubKey(byte[],byte[])>($r17, $r18) |
Operation on object of type java.security.Signature object not completed. Expected call to initVerify, update, verify |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer703, $r4, $r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r81.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer614, $r80, $r79) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1553) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1586) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1506) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1564) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1577) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1607) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1517) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r8, varReplacer1518) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1482) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: void init(int,java.security.Key)>($b4, r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1487) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1451) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1450) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1536) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMAC.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r6, $r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method digest on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1573) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1573) |
Unexpected call to method getInstance on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.update([BII)V |
virtualinvoke $r2.<java.security.MessageDigest: void update(byte[],int,int)>(r1, i0, i1) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method digest on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1521) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1521) |
Unexpected call to method getInstance on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.update([BII)V |
virtualinvoke $r2.<java.security.MessageDigest: void update(byte[],int,int)>(r1, i0, i1) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1445) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1597) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1461) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1159) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1157) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.50 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX256.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer238, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;[B)V |
interfaceinvoke $r13.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer236, r5, r4) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Signature |
com.jcraft.jsch.KeyPairDSA.getVerifier()Lcom/jcraft/jsch/Signature; |
interfaceinvoke r1.<com.jcraft.jsch.SignatureDSA: void setPubKey(byte[],byte[],byte[],byte[])>($r19, $r20, $r21, $r22) |
Operation on object of type java.security.Signature object not completed. Expected call to initVerify, update, verify |
- |
- |
|
Signature |
com.jcraft.jsch.KeyPairRSA.getVerifier()Lcom/jcraft/jsch/Signature; |
interfaceinvoke r1.<com.jcraft.jsch.SignatureRSA: void setPubKey(byte[],byte[])>($r17, $r18) |
Operation on object of type java.security.Signature object not completed. Expected call to initVerify, update, verify |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer764, $r4, $r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r81.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer632, $r80, $r79) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1750) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
virtualinvoke $r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r15, $r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1793) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1706) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1769) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1781) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1811) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1714) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: void init(int,java.security.Key)>($b3, r9) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r8, varReplacer1718) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1686) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: void init(int,java.security.Key)>($b4, r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1687) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1657) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r9, varReplacer1656) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r12) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r11, varReplacer1737) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMAC.init([B)V |
virtualinvoke $r5.<javax.crypto.Mac: void init(java.security.Key)>(r8) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMAC.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r6, $r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1775) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1721) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1645) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r3, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1803) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1666) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r17) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1286) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1284) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.51 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX256.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX256.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer242, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
$r13 = interfaceinvoke r4.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r4 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r3, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r6.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;[B)V |
interfaceinvoke $r13.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer239, r5, r4) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPairPKCS8.decrypt([B)Z |
interfaceinvoke r39.<com.jcraft.jsch.Cipher: void update(byte[],int,int,byte[],int)>(r3, varReplacer1350, $i2, r43, varReplacer1350) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to init |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer779, $r4, $r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r81.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer655, $r80, $r79) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES192CBC.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r19, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES256CTR.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1765) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
virtualinvoke $r8.<javax.crypto.Cipher: void init(int,java.security.Key)>($b3, r13) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r3 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1735) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
virtualinvoke $r5.<javax.crypto.Cipher: void init(int,java.security.Key)>($b4, r11) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r3 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1702) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r14, varReplacer1706, varReplacer1707, r14, varReplacer1706) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r19, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMAC.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r6, $r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1828) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
PBEKeySpec |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
$r7 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r10) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
specialinvoke $r6.<javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>(r3, r2, i0, $i4) |
Second parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
$r7 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r10) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1813) |
First parameter (with value "PBKDF2WithHmacSHA1") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1772) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA256.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1696) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
virtualinvoke $r13.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r3, $r12) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r12.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r18) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1851) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r21) |
First parameter was not properly generated as specced Key |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
virtualinvoke $r13.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r3, $r12) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r12.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r18) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1712) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r21) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1309) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1307) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.52 |
|
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r19.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer252, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;[B)V |
interfaceinvoke $r13.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer251, r5, r4) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPairPKCS8.decrypt([B)Z |
interfaceinvoke r39.<com.jcraft.jsch.Cipher: void update(byte[],int,int,byte[],int)>(r3, varReplacer1444, $i2, r43, varReplacer1444) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to init |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer799, $r4, $r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r81.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer678, $r80, $r79) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
Signature |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke r4.<com.jcraft.jsch.Signature: void init()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, initVerify |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES128CBC.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r19, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES192CBC.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r19, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r19, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1791) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r3 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1748) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r14, varReplacer1751, varReplacer1752, r14, varReplacer1751) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r3 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1718) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.BlowfishCBC.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMAC.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r6, $r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1862) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
PBEKeySpec |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
$r7 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r10) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
specialinvoke $r6.<javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>(r3, r2, i0, $i4) |
Second parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
$r7 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r10) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1847) |
First parameter (with value "PBKDF2WithHmacSHA1") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1800) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
AlgorithmParameters |
com.jcraft.jsch.jce.SignatureECDSA.setPrvKey([B)V |
r1 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1879) |
First parameter (with value "EC") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureECDSA.setPrvKey([B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
AlgorithmParameters |
com.jcraft.jsch.jce.SignatureECDSA.setPubKey([B[B)V |
r1 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1877) |
First parameter (with value "EC") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureECDSA.setPubKey([B[B)V |
virtualinvoke $r17.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1694) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r12.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r18) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1906) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r21) |
First parameter was not properly generated as specced Key |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r12.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r18) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1728) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r21) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1403) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1401) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.53 |
|
|
MessageDigest |
com.jcraft.jsch.DHECN.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r11.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r19.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke r2.<com.jcraft.jsch.DH: byte[] getE()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r11.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer255, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
$r13 = interfaceinvoke r4.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, <java.security.MessageDigest: byte[] digest()>, <java.security.MessageDigest: int digest(byte[],int,int)>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
$r13 = interfaceinvoke r4.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
r27 = interfaceinvoke $r15.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, <java.security.MessageDigest: byte[] digest()>, <java.security.MessageDigest: int digest(byte[],int,int)>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
r27 = interfaceinvoke $r19.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, <java.security.MessageDigest: byte[] digest()>, <java.security.MessageDigest: int digest(byte[],int,int)>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r4 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r3, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r6.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;[B)V |
interfaceinvoke $r13.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer251, r5, r4) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPairPKCS8.decrypt([B)Z |
interfaceinvoke r39.<com.jcraft.jsch.Cipher: void update(byte[],int,int,byte[],int)>(r3, varReplacer1443, $i2, r43, varReplacer1443) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to init |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer798, $r4, $r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r81.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer680, $r80, $r79) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Signature |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke r4.<com.jcraft.jsch.Signature: void init()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, initVerify |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES128CBC.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES256CBC.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1788) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r3 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1753) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r14, varReplacer1749, varReplacer1750, r14, varReplacer1749) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r3 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1719) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r14, varReplacer1720, varReplacer1721, r14, varReplacer1720) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r19, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMAC.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r6, $r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method digest on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1863) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1863) |
Unexpected call to method getInstance on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.update([BII)V |
virtualinvoke $r2.<java.security.MessageDigest: void update(byte[],int,int)>(r1, i0, i1) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
PBEKeySpec |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
$r7 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r10) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
specialinvoke $r6.<javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>(r3, r2, i0, $i4) |
Second parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
$r7 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r10) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1848) |
First parameter (with value "PBKDF2WithHmacSHA1") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1801) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA384.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA512.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
AlgorithmParameters |
com.jcraft.jsch.jce.SignatureECDSA.setPrvKey([B)V |
r1 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1879) |
First parameter (with value "EC") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureECDSA.setPrvKey([B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
AlgorithmParameters |
com.jcraft.jsch.jce.SignatureECDSA.setPubKey([B[B)V |
r1 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1877) |
First parameter (with value "EC") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureECDSA.setPubKey([B[B)V |
virtualinvoke $r17.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1695) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r12.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r18) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1910) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r21) |
First parameter was not properly generated as specced Key |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r12.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r18) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1732) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r21) |
First parameter was not properly generated as specced Key |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.TripleDESCTR.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1404) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1402) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.54 |
|
|
MessageDigest |
com.jcraft.jsch.DHECN.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r11.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r19.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke r2.<com.jcraft.jsch.DH: byte[] getE()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r11.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer252, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
$r13 = interfaceinvoke r4.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r4 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r3, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r6.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;[B)V |
interfaceinvoke $r13.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer246, r5, r4) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPairPKCS8.decrypt([B)Z |
interfaceinvoke r39.<com.jcraft.jsch.Cipher: void update(byte[],int,int,byte[],int)>(r3, varReplacer1453, $i2, r43, varReplacer1453) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to init |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer803, $r4, $r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r81.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer677, $r80, $r79) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Signature |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke r4.<com.jcraft.jsch.Signature: void init()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, initVerify |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r19, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r19, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1796) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r3 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1756) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r3 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1722) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
virtualinvoke $r6.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r14, varReplacer1726, varReplacer1727, r14, varReplacer1726) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Mac |
com.jcraft.jsch.jce.HMAC.init([B)V |
virtualinvoke $r5.<javax.crypto.Mac: void init(java.security.Key)>(r8) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMAC.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r6, $r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1867) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
PBEKeySpec |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
$r7 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r10) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
specialinvoke $r6.<javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>(r3, r2, i0, $i4) |
Second parameter was not properly generated as randomized |
- |
- |
|
PBEKeySpec |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
specialinvoke $r6.<javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>(r3, r2, i0, $i4) |
Third parameter (with value 0)Variable iterationCountmust be at least 10000 |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
$r7 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r10) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1851) |
First parameter (with value "PBKDF2WithHmacSHA1") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1805) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA256.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA384.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
AlgorithmParameters |
com.jcraft.jsch.jce.SignatureECDSA.setPrvKey([B)V |
r1 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1883) |
First parameter (with value "EC") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureECDSA.setPrvKey([B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
AlgorithmParameters |
com.jcraft.jsch.jce.SignatureECDSA.setPubKey([B[B)V |
r1 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1881) |
First parameter (with value "EC") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureECDSA.setPubKey([B[B)V |
virtualinvoke $r17.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1700) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r12.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r18) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1915) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r21) |
First parameter was not properly generated as specced Key |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r12.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r18) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1733) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r21) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1408) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1406) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
0.1.55 |
|
|
MessageDigest |
com.jcraft.jsch.DHECN.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r11.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG1.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r18.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHG14.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r10.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r19.<com.jcraft.jsch.DH: void init()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke r2.<com.jcraft.jsch.DH: byte[] getE()>() |
Operation on object of type java.security.KeyPairGenerator object not completed. Expected call to initialize |
- |
- |
|
MessageDigest |
com.jcraft.jsch.DHGEX.init(Lcom/jcraft/jsch/Session;[B[B[B[B)V |
interfaceinvoke $r11.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.HostKey.getFingerPrint(Lcom/jcraft/jsch/JSch;)Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyExchange.getFingerPrint()Ljava/lang/String; |
$r6 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>(r13, $r5) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.decrypt([B)Z |
interfaceinvoke $r5.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer252, r8, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
$r13 = interfaceinvoke r4.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, <java.security.MessageDigest: byte[] digest()>, <java.security.MessageDigest: int digest(byte[],int,int)>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
$r13 = interfaceinvoke r4.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
r27 = interfaceinvoke $r15.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, <java.security.MessageDigest: byte[] digest()>, <java.security.MessageDigest: int digest(byte[],int,int)>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.genKey([B[B)[B |
r27 = interfaceinvoke $r19.<com.jcraft.jsch.HASH: byte[] digest()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to <java.security.MessageDigest: byte[] digest(byte[])>, <java.security.MessageDigest: byte[] digest()>, <java.security.MessageDigest: int digest(byte[],int,int)>, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
$r4 = staticinvoke <com.jcraft.jsch.Util: java.lang.String getFingerPrint(com.jcraft.jsch.HASH,byte[])>($r3, r1) |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.KeyPair.getFingerPrint()Ljava/lang/String; |
interfaceinvoke $r6.<com.jcraft.jsch.HASH: void init()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPair.writePrivateKey(Ljava/io/OutputStream;[B)V |
interfaceinvoke $r13.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer250, r5, r4) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.KeyPairPKCS8.decrypt([B)Z |
interfaceinvoke r39.<com.jcraft.jsch.Cipher: void update(byte[],int,int,byte[],int)>(r3, varReplacer1455, $i2, r43, varReplacer1455) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to init |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.checkCipher(Ljava/lang/String;)Z |
interfaceinvoke r1.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer803, $r4, $r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Cipher |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke $r81.<com.jcraft.jsch.Cipher: void init(int,byte[],byte[])>(varReplacer676, $r80, $r79) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)> |
- |
- |
|
Signature |
com.jcraft.jsch.Session.connect(I)V |
interfaceinvoke r4.<com.jcraft.jsch.Signature: void init()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, initVerify |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES128CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r19, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r19, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES192CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES256CBC.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
virtualinvoke $r11.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r19, $r10) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.AES256CTR.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
$r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1814) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR.init(I[B[B)V |
virtualinvoke $r8.<javax.crypto.Cipher: void init(int,java.security.Key)>($b3, r13) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
$r3 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1773) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR128.init(I[B[B)V |
virtualinvoke $r5.<javax.crypto.Cipher: void init(int,java.security.Key)>($b4, r11) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.ARCFOUR256.init(I[B[B)V |
$r3 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer1737) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.BlowfishCBC.init(I[B[B)V |
specialinvoke $r10.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.BlowfishCBC.update([BII[BI)V |
virtualinvoke $r3.<javax.crypto.Cipher: int update(byte[],int,int,byte[],int)>(r1, i0, i1, r2, i2) |
Unexpected call to method update on object of type javax.crypto.Cipher. Expect a call to one of the following methods init |
- |
- |
|
SecretKeySpec |
com.jcraft.jsch.jce.HMAC.init([B)V |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r6, $r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenDSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r6) |
First parameter (with value 1024) should be any of {2048} |
- |
- |
|
KeyPairGenerator |
com.jcraft.jsch.jce.KeyPairGenRSA.init(I)V |
virtualinvoke r1.<java.security.KeyPairGenerator: void initialize(int,java.security.SecureRandom)>(i0, $r5) |
First parameter (with value 1024) should be any of {2048, 4096} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.MD5.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1908) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
PBEKeySpec |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
$r7 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r10) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
specialinvoke $r6.<javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>(r3, r2, i0, $i4) |
Second parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
$r7 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r10) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.PBKDF.getKey([B[BII)[B |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1893) |
First parameter (with value "PBKDF2WithHmacSHA1") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method digest on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1824) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.init()V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1824) |
Unexpected call to method getInstance on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA1.update([BII)V |
virtualinvoke $r2.<java.security.MessageDigest: void update(byte[],int,int)>(r1, i0, i1) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jce.SHA384.digest()[B |
$r2 = virtualinvoke $r1.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPrvKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureDSA.setPubKey([B[B[B[B)V |
virtualinvoke $r13.<java.security.Signature: void initVerify(java.security.PublicKey)>(r6) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureECDSAN.init()V |
$r3 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r2) |
First parameter (with value "SHA512withECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
AlgorithmParameters |
com.jcraft.jsch.jce.SignatureECDSAN.setPrvKey([B)V |
r1 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1854) |
First parameter (with value "EC") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureECDSAN.setPrvKey([B)V |
virtualinvoke $r13.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
AlgorithmParameters |
com.jcraft.jsch.jce.SignatureECDSAN.setPubKey([B[B)V |
r1 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1852) |
First parameter (with value "EC") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureECDSAN.setPubKey([B[B)V |
virtualinvoke $r17.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.init()V |
$r1 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(varReplacer1709) |
First parameter (with value "SHA1withRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPrvKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initSign(java.security.PrivateKey)>(r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
com.jcraft.jsch.jce.SignatureRSA.setPubKey([B[B)V |
virtualinvoke $r9.<java.security.Signature: void initVerify(java.security.PublicKey)>(r4) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
virtualinvoke $r13.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r3, $r12) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
specialinvoke $r12.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r18) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1932) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCBC.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r21) |
First parameter was not properly generated as specced Key |
- |
- |
|
Cipher |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
virtualinvoke $r13.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>($b5, r3, $r12) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
IvParameterSpec |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
specialinvoke $r12.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r18) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r2 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String)>(varReplacer1747) |
First parameter (with value "DESede") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeyFactory |
com.jcraft.jsch.jce.TripleDESCTR.init(I[B[B)V |
r3 = virtualinvoke r2.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r21) |
First parameter was not properly generated as specced Key |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD5.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1418) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACMD596.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACMD5: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA1.<init>()V |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1416) |
First parameter (with value "SHA-1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.jcraft.jsch.jcraft.HMACSHA196.<init>()V |
specialinvoke r0.<com.jcraft.jsch.jcraft.HMACSHA1: void <init>()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |