Version |
Insecure |
CryptoMisuse |
Rule name |
Method |
Statement |
Details |
1.7.8 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer280) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer266) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer714) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer658) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer668) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer662, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer662, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer666, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer684) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer686, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer688, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer688, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer698, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer551) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r13.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer790) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer832) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer833, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer833, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1840) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1842) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2219) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2220, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2220, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2217) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2218) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2218) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.7.9 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer281) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer266) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer712) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer658) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer674) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer667, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer668, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer668, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer683) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer691, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer692, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer696, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer696, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer551) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r13.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer791) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer831) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer832, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer832, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1828) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1829) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2208) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2209, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2209, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2206) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2207) |
Second parameter was not properly generated as generated Trust Manager |
1.7.10 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer284) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer266) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer714) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer658) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer669) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer664, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer668, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer668, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer691) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer695, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer695, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer696, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer701, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer552) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r13.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer791) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer831) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer833, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer833, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1827) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1830) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2210) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2211, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2211, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2208) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2209) |
Second parameter was not properly generated as generated Trust Manager |
1.7.11 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer290) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer269) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer716) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer663) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer679) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer665, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer665, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer674, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer696) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer685, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer685, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer691, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer695, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer554) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r13.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer792) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer833) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer834, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer834, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1846) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1847) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2229) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2230, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2230, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2228) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2227) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2227) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.7.12 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer289) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer272) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer701) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer645) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer661) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer649, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer649, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer652, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer675) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer671, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer676, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer676, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer677, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer540) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r13.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer777) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer818) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer820, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer820, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1843) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1845) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2226) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2227, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2227, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2224) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2225) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2225) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.7.13 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer292) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer272) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer703) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer650) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer655) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer653, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer653, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer661, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer690) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer680, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer680, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer684, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer685, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer542) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r13.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer779) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer821) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer822, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer822, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1845) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1848) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2229) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2230, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2230, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2228) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2227) |
Second parameter was not properly generated as generated Trust Manager |
1.7.14 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer309) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer300) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer729) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer675) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer685) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer683, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer693, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer693, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer706) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer703, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer703, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer705, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer711, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.lmv2Response([B[B[B)[B |
r4 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer569) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
r20 = virtualinvoke $r12.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r6.<java.security.MessageDigest: void update(byte[])>($r5) |
Unexpected call to method <java.security.MessageDigest: void update(byte[])> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
$r6 = virtualinvoke $r5.<java.security.MessageDigest: byte[] digest(byte[])>(r1) |
Unexpected call to method <java.security.MessageDigest: byte[] digest(byte[])> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
r1 = virtualinvoke $r2.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method <java.security.MessageDigest: void update(byte[])> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r13.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer806) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer848) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer850, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer850, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1875) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1876) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2250) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2251, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2251, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2249) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2248) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2248) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.7.15 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer309) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer300) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer731) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer675) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer687) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer683, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer690, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer690, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer708) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer703, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer712, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer712, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer714, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer570) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer807) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer850) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer849, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer849, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1876) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1878) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2260) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2259, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2259, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2257) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2258) |
Second parameter was not properly generated as generated Trust Manager |
1.7.16 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer318) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer300) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer729) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer678) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer690) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer679, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer682, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer682, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer708) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer701, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer703, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer703, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer709, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.lmv2Response([B[B[B)[B |
r4 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.ntlmv2Hash(Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;)[B |
$r9 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer570) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
r20 = virtualinvoke $r12.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
$r6 = virtualinvoke $r5.<java.security.MessageDigest: byte[] digest(byte[])>(r1) |
Unexpected call to method <java.security.MessageDigest: byte[] digest(byte[])> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
r1 = virtualinvoke $r2.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.update([B)V |
virtualinvoke $r2.<java.security.MessageDigest: void update(byte[])>(r1) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer806) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer849) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer850, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer850, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1875) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1876) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2264) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2265, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2265, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2262) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2263) |
Second parameter was not properly generated as generated Trust Manager |
1.7.17 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer313) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer300) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer731) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer678) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer680) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer681, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer692, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer692, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer713) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer700, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer709, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer718, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer718, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.lmv2Response([B[B[B)[B |
r4 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.ntlmv2Hash(Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;)[B |
$r9 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer570) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
$r6 = virtualinvoke $r5.<java.security.MessageDigest: byte[] digest(byte[])>(r1) |
Unexpected call to method <java.security.MessageDigest: byte[] digest(byte[])> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
r1 = virtualinvoke $r2.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method <java.security.MessageDigest: void update(byte[])> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer807) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer849) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer848, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer848, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1882) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1884) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2272) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2271, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2271, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2269) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2270) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2270) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.7.18 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer314) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer305) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer735) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer679) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer685) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer689, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer689, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer698, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer712) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer704, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer704, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer714, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer715, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer574) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer812) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer852) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer854, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer854, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1886) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1887) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2279) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2278, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2278, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2277) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2276) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2276) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.7.19 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer323) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer306) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer736) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer682) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer701) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer694, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer694, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer700, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer707) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer711, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer711, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer716, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer718, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.lmv2Response([B[B[B)[B |
r4 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.ntlmv2Hash(Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;)[B |
$r9 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer576) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
r20 = virtualinvoke $r12.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r6.<java.security.MessageDigest: void update(byte[])>($r5) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
$r6 = virtualinvoke $r5.<java.security.MessageDigest: byte[] digest(byte[])>(r1) |
Unexpected call to method <java.security.MessageDigest: byte[] digest(byte[])> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
r1 = virtualinvoke $r2.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.update([B)V |
virtualinvoke $r2.<java.security.MessageDigest: void update(byte[])>(r1) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer815) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer847) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer848, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer848, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1863) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1864) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2254) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2255, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2255, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2252) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2253) |
Second parameter was not properly generated as generated Trust Manager |
1.7.20 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer330) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer311) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer744) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer691) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer707) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer693, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer693, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer703, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer727) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer713, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer714, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer715, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer715, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.lmv2Response([B[B[B)[B |
r4 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.ntlmv2Hash(Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;)[B |
$r9 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer582) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
r20 = virtualinvoke $r12.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r6.<java.security.MessageDigest: void update(byte[])>($r5) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
$r6 = virtualinvoke $r5.<java.security.MessageDigest: byte[] digest(byte[])>(r1) |
Unexpected call to method <java.security.MessageDigest: byte[] digest(byte[])> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
r1 = virtualinvoke $r2.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method <java.security.MessageDigest: void update(byte[])> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.update([B)V |
virtualinvoke $r2.<java.security.MessageDigest: void update(byte[])>(r1) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer819) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer855) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer854, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer854, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1885) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1887) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2282) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2283, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2283, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2281) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2280) |
Second parameter was not properly generated as generated Trust Manager |
1.7.21 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r41 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer332) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer319) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r41.<java.security.MessageDigest: void update(byte[])>($r37) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer747) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer696) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer705) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer701, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer701, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer712, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer734) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer728, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer735, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer735, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer736, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer588) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer826) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer858) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer859, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer859, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer6) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer3, varReplacer3, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer3, varReplacer3, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1891) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1894) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2291) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2290, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2290, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2289) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2288) |
Second parameter was not properly generated as generated Trust Manager |
1.7.22 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer329) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer318) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer749) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer693) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer700) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer702, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer702, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer707, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer733) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer726, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer731, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer732, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer732, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer587) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer825) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer859) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer860, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer860, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer6) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer4, varReplacer4, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer4, varReplacer4, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1895) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1897) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2292) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2293, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2293, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2290) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2291) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2291) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.7.23 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer328) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer318) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer749) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer696) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer711) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer707, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer712, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer712, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer724) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer719, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer729, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer730, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer730, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer588) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer825) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer859) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer858, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer858, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer5) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer0, varReplacer0, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer0, varReplacer0, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1896) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1897) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2293) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2292, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2292, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2291) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2290) |
Second parameter was not properly generated as generated Trust Manager |
1.7.24 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer342) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer318) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer749) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer696) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer706) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer698, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer701, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer701, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer721) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer728, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer728, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer732, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer733, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer587) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer825) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer859) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer860, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer860, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer5) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2, varReplacer2, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2, varReplacer2, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1895) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1898) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2290) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2289, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2289, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2288) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2287) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2287) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.8.0 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer332) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer319) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer746) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer692) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer704) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer703, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer703, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer708, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer727) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer719, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer731, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer731, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer735, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer587) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer823) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer861) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer860, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer860, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer3) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer4, varReplacer4, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer4, varReplacer4, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1885) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1887) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2292) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2291, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2291, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2290) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2289) |
Second parameter was not properly generated as generated Trust Manager |
1.8.1 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer327) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer316) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer744) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer690) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer700) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer696, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer708, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer708, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer732) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer719, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer728, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer728, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer733, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer585) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer823) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer858) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer857, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer857, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer1) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer4, varReplacer4, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer4, varReplacer4, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1884) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1886) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2290) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2289, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2289, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2288) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2287) |
Second parameter was not properly generated as generated Trust Manager |
1.8.2 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer290) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer282) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer804) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer753) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer758) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer754, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer767, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer767, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer793) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer775, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer786, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer786, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer792, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer645) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer882) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer918) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer919, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer919, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer5) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2, varReplacer2, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2, varReplacer2, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1945) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1947) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2315) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2314, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2314, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2313) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2312) |
Second parameter was not properly generated as generated Trust Manager |
1.8.3 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer290) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer282) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer806) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer753) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer761) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer762, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer766, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer766, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer793) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer778, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer789, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer792, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer792, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer644) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer881) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer917) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer918, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer918, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer0) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer1, varReplacer1, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer1, varReplacer1, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1944) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1947) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2313) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2314, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2314, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2312) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2311) |
Second parameter was not properly generated as generated Trust Manager |
1.8.4 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer300) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer281) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer803) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer752) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer755) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer760, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer760, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer761, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer774) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer776, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer776, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer777, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer792, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer643) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer880) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer916) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer917, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer917, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer5, varReplacer5, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer5, varReplacer5, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1945) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1947) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2313) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2314, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2314, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2312) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2311) |
Second parameter was not properly generated as generated Trust Manager |
1.8.5 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer295) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer282) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer806) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer752) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer767) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer757, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer757, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer768, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer791) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer784, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer786, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer786, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer795, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer646) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer885) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer919) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer920, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer920, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer3) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer5, varReplacer5, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer5, varReplacer5, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1951) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1952) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2324) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2323, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2323, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2321) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2322) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2322) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.8.6 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer304) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer283) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer808) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer752) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer756) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer758, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer758, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer769, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer789) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer777, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer779, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer779, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer784, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer647) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer883) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer921) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer919, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer919, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer0) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2, varReplacer2, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2, varReplacer2, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1951) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1952) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2324) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2323, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2323, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2321) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2322) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2322) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.8.7 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer297) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer282) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer806) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer755) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer771) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer756, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer756, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer758, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer790) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer787, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer787, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer794, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer795, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer646) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer884) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer920) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer921, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer921, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer1) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer3, varReplacer3, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer3, varReplacer3, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1950) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1953) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2325) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2326, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2326, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2324) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2323) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2323) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.8.8 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer305) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer284) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer809) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer758) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer760) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer762, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer762, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer774, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer783) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer787, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer787, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer788, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer795, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer650) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer886) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer924) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer923, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer923, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer4) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer1, varReplacer1, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer1, varReplacer1, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1953) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1955) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2331) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2330, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2330, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2328) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2329) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2329) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.8.9 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer302) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer284) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer819) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer766) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer774) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer770, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer775, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer775, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer803) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer788, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer804, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer805, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer805, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer657) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer896) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer930) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer931, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer931, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer6) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer3, varReplacer3, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer3, varReplacer3, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1966) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1969) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2343) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2344, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2344, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2342) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2341) |
Second parameter was not properly generated as generated Trust Manager |
1.8.10 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer239) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer229) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer763) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer710) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer723) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer712, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer712, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer716, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer739) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer732, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer732, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer736, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer747, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer601) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer840) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer874) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer875, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer875, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer5) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2, varReplacer2, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2, varReplacer2, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1907) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1909) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2284) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2285, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2285, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2283) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2282) |
Second parameter was not properly generated as generated Trust Manager |
1.8.11 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer253) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer229) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer762) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer711) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer720) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer712, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer712, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer725, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer743) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer733, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer733, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer734, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer735, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer602) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer840) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer875) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer876, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer876, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer3) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer4, varReplacer4, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer4, varReplacer4, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1909) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1911) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2286) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2287, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2287, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r32.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r1, $r33) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r1.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r2, $r30) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r5, $r34) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2285) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2284) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2284) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
TrustManagerFactory |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r36.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
1.8.12 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer240) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer230) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer765) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer709) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer714) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer720, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer721, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer721, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer748) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer737, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer737, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer749, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer752, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.lmv2Response([B[B[B)[B |
r4 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer604) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
r20 = virtualinvoke $r12.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
r1 = virtualinvoke $r2.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer842) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer876) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer877, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer877, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer0) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer1, varReplacer1, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer1, varReplacer1, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1907) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1909) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2285) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2286, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2286, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2283) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2284) |
Second parameter was not properly generated as generated Trust Manager |
1.8.13 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer242) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer234) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer768) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer714) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer726) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer724, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer728, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer728, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer754) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer739, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer739, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer743, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer747, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer609) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer845) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer881) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer883, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer883, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer0) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer3, varReplacer3, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer3, varReplacer3, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1921) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1922) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2298) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2297, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2297, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2295) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2296) |
Second parameter was not properly generated as generated Trust Manager |
1.8.14 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer252) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer234) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer770) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer714) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer728) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer719, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer719, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer729, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer754) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer741, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer746, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer747, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer747, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer608) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer845) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer881) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer882, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer882, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer3) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer0, varReplacer0, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer0, varReplacer0, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1921) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1923) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2298) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2297, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2297, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2295) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2296) |
Second parameter was not properly generated as generated Trust Manager |
1.8.15 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r53 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer255) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer233) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r30) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r53.<java.security.MessageDigest: void update(byte[])>($r50) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer768) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer715) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer727) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer717, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer717, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer728, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer737) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer748, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer748, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer753, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer755, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer606) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer845) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer880) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer879, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer879, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer4, varReplacer4, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer4, varReplacer4, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1932) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1934) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2309) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2308, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2308, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2306) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2307) |
Second parameter was not properly generated as generated Trust Manager |
1.8.16 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r65 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer254) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer234) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r65.<java.security.MessageDigest: void update(byte[])>($r32) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r65.<java.security.MessageDigest: void update(byte[])>($r52) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r65.<java.security.MessageDigest: void update(byte[])>($r62) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer769) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer715) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer732) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer720, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer733, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer733, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer745) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer740, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer744, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer744, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer746, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer610) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer847) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer882) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer884, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer884, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer6) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer4, varReplacer4, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer4, varReplacer4, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1937) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1938) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2313) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2314, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2314, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2311) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2312) |
Second parameter was not properly generated as generated Trust Manager |
1.8.17 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r65 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer259) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r7 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer233) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r65.<java.security.MessageDigest: void update(byte[])>($r32) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r65.<java.security.MessageDigest: void update(byte[])>($r52) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r65.<java.security.MessageDigest: void update(byte[])>($r62) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer771) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.getNTLM2SessionResponse(Ljava/lang/String;[B[B)[B |
r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer718) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer730) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer724, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer724, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer729, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer744) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer743, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer743, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer748, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer755, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.lmv2Response([B[B[B)[B |
r4 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.ntlmv2Hash(Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;)[B |
$r9 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r1 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer609) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
r20 = virtualinvoke $r12.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r4.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r6.<java.security.MessageDigest: void update(byte[])>($r5) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
$r6 = virtualinvoke $r5.<java.security.MessageDigest: byte[] digest(byte[])>(r1) |
Unexpected call to method <java.security.MessageDigest: byte[] digest(byte[])> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
r1 = virtualinvoke $r2.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.update([B)V |
virtualinvoke $r2.<java.security.MessageDigest: void update(byte[])>(r1) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r15.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, varReplacer848) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
r9 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer882) |
First parameter (with value "SSL") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer883, r16, r13) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.apache.ApacheAsyncHttpProvider$TrustingSSLSocketFactory.<init>()V |
virtualinvoke r9.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer883, r16, r13) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r17 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer0) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2, varReplacer2, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r17.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2, varReplacer2, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1937) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.WebSocketUtil.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1938) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
r0 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2313) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2314, r5, r4) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getLooseSSLContext()Ljavax/net/ssl/SSLContext; |
virtualinvoke r0.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2314, r5, r4) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
r7 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2312) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getStrictSSLContext(Lcom/ning/http/util/SslUtils$SSLConfig;)Ljavax/net/ssl/SSLContext; |
virtualinvoke r7.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(r3, r6, varReplacer2311) |
Second parameter was not properly generated as generated Trust Manager |
1.9.0 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r57 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer255) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r8 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer238) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r57.<java.security.MessageDigest: void update(byte[])>($r33) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r57.<java.security.MessageDigest: void update(byte[])>($r54) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.RC4([B[B)[B |
r7 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer844) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.RC4([B[B)[B |
virtualinvoke r7.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer843, $r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.RC4([B[B)[B |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, varReplacer845) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer899) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.hmacMD5([B[B)[B |
$r4 = virtualinvoke r2.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer859) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r4.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer857, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r4.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer857, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r4.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer863, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer868) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer867, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer881, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer881, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer885, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.lmv2Hash(Ljava/lang/String;Ljava/lang/String;[B)[B |
$r10 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.lmv2Response([B[B[B)[B |
r4 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.ntlm2SessionResponse([B[B[B)[B |
r10 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer846) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.ntlmv2Hash(Ljava/lang/String;Ljava/lang/String;[B)[B |
$r10 = virtualinvoke r3.<com.ning.http.client.ntlm.NTLMEngine$HMACMD5: byte[] getOutput()>() |
Operation on object of type java.security.MessageDigest object not completed. Expected call to digest, update |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine$CipherGen.getLanManagerSessionKey()[B |
r17 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer729) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine$CipherGen.getLanManagerSessionKey()[B |
r18 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer731) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine$CipherGen.getLanManagerSessionKey()[B |
virtualinvoke r17.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer730, r1) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine$CipherGen.getLanManagerSessionKey()[B |
virtualinvoke r18.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer732, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer733) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
r21 = virtualinvoke $r13.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r5.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r7.<java.security.MessageDigest: void update(byte[])>($r6) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
$r6 = virtualinvoke $r5.<java.security.MessageDigest: byte[] digest(byte[])>(r1) |
Unexpected call to method digest on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
r1 = virtualinvoke $r2.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.update([B)V |
virtualinvoke $r2.<java.security.MessageDigest: void update(byte[])>(r1) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r17.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer972) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r16 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer4) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r16.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer1, varReplacer1, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r16.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer1, varReplacer1, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.ws.WebSocketUtils.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1824) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.ws.WebSocketUtils.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1827) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.<init>()V |
r8 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2093) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.<init>()V |
virtualinvoke r8.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2092, r15, r12) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.<init>()V |
virtualinvoke r8.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2092, r15, r12) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getSSLContext(Z)Ljavax/net/ssl/SSLContext; |
$r1 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getDefault()>() |
Detected call to forbidden method javax.net.ssl.SSLContext getDefault() of class javax.net.ssl.SSLContext. Instead, call method <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String,java.lang.String)>, <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>, <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String,java.security.Provider)>. |
1.9.1 |
|
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r57 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer254) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
r8 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer238) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r57.<java.security.MessageDigest: void update(byte[])>($r33) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
MessageDigest |
com.ning.http.client.Realm$RealmBuilder.build()Lcom/ning/http/client/Realm; |
virtualinvoke r57.<java.security.MessageDigest: void update(byte[])>($r54) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.RC4([B[B)[B |
r7 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer843) |
First parameter (with value "RC4") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.RC4([B[B)[B |
virtualinvoke r7.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer844, $r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.RC4([B[B)[B |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, varReplacer845) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
com.ning.http.client.ntlm.NTLMEngine.createDESKey([BI)Ljava/security/Key; |
specialinvoke $r3.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r2, varReplacer897) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
r4 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer850) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r4.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer851, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r4.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer854, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmHash(Ljava/lang/String;)[B |
virtualinvoke r4.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer854, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
r5 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer884) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer873, r4) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer874, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer874, r3) |
Unexpected call to method init on object of type javax.crypto.Cipher. Expect a call to one of the following methods update,doFinal |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine.lmResponse([B[B)[B |
virtualinvoke r5.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer885, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine.ntlm2SessionResponse([B[B[B)[B |
r10 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer846) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine$CipherGen.getLanManagerSessionKey()[B |
r17 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer718) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine$CipherGen.getLanManagerSessionKey()[B |
r18 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(varReplacer729) |
First parameter (with value "DES/ECB/NoPadding") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine$CipherGen.getLanManagerSessionKey()[B |
virtualinvoke r17.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer727, r1) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
com.ning.http.client.ntlm.NTLMEngine$CipherGen.getLanManagerSessionKey()[B |
virtualinvoke r18.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer732, r2) |
Second parameter was not properly generated as generated Key |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer733) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.<init>([B)V |
virtualinvoke $r5.<java.security.MessageDigest: void reset()>() |
Unexpected call to method reset on object of type java.security.MessageDigest. Expect a call to one of the following methods digest,update |
- |
- |
|
MessageDigest |
com.ning.http.client.ntlm.NTLMEngine$HMACMD5.getOutput()[B |
virtualinvoke $r4.<java.security.MessageDigest: void update(byte[])>($r3) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Mac |
com.ning.http.client.oauth.OAuthSignatureCalculator.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
$i0 = staticinvoke <java.lang.System: int identityHashCode(java.lang.Object)>(r0) |
Operation on object of type javax.crypto.Mac object not completed. Expected call to update, doFinal |
- |
- |
|
SecretKeySpec |
com.ning.http.client.oauth.ThreadSafeHMAC.<init>(Lcom/ning/http/client/oauth/ConsumerKey;Lcom/ning/http/client/oauth/RequestToken;)V |
specialinvoke $r17.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, varReplacer971) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
r16 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer1) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r16.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer3, varReplacer3, r1) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.client.providers.grizzly.GrizzlyAsyncHttpProvider.main([Ljava/lang/String;)V |
virtualinvoke r16.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer3, varReplacer3, r1) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.ws.WebSocketUtils.md5([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1823) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
com.ning.http.client.providers.netty.ws.WebSocketUtils.sha1([B)[B |
r4 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer1824) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.<init>()V |
r8 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>(varReplacer2090) |
First parameter (with value "TLS") should be any of {TLSv1, TLSv1.1, TLSv1.2} |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.<init>()V |
virtualinvoke r8.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2091, r15, r12) |
First parameter was not properly generated as generated Key Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.<init>()V |
virtualinvoke r8.<javax.net.ssl.SSLContext: void init(javax.net.ssl.KeyManager[],javax.net.ssl.TrustManager[],java.security.SecureRandom)>(varReplacer2091, r15, r12) |
Second parameter was not properly generated as generated Trust Manager |
- |
- |
|
SSLContext |
com.ning.http.util.SslUtils.getSSLContext(Z)Ljavax/net/ssl/SSLContext; |
$r1 = staticinvoke <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getDefault()>() |
Detected call to forbidden method javax.net.ssl.SSLContext getDefault() of class javax.net.ssl.SSLContext. Instead, call method <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String)>, <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String,java.security.Provider)>, <javax.net.ssl.SSLContext: javax.net.ssl.SSLContext getInstance(java.lang.String,java.lang.String)>. |
1.9.2 |
|
|
|
|
|
|
1.9.3 |
|
|
|
|
|
|
1.9.4 |
|
|
|
|
|
|
1.9.5 |
|
|
|
|
|
|
1.9.6 |
|
|
|
|
|
|
1.9.7 |
|
|
|
|
|
|
1.9.8 |
|
|
|
|
|
|
1.9.9 |
|
|
|
|
|
|
1.9.10 |
|
|
|
|
|
|
1.9.11 |
|
|
|
|
|
|
1.9.12 |
|
|
|
|
|
|
1.9.13 |
|
|
|
|
|
|
1.9.14 |
|
|
|
|
|
|
1.9.15 |
|
|
|
|
|
|
1.9.16 |
|
|
|
|
|
|
1.9.17 |
|
|
|
|
|
|
1.9.18 |
|
|
|
|
|
|
1.9.19 |
|
|
|
|
|
|
1.9.20 |
|
|
|
|
|
|
1.9.21 |
|
|
|
|
|
|
1.9.22 |
|
|
|
|
|
|
1.9.23 |
|
|
|
|
|
|
1.9.24 |
|
|
|
|
|
|
1.9.25 |
|
|
|
|
|
|
1.9.26 |
|
|
|
|
|
|
1.9.27 |
|
|
|
|
|
|
1.9.28 |
|
|
|
|
|
|
1.9.29 |
|
|
|
|
|
|
1.9.30 |
|
|
|
|
|
|
1.9.31 |
|
|
|
|
|
|
1.9.32 |
|
|
|
|
|
|
1.9.33 |
|
|
|
|
|
|
1.9.34 |
|
|
|
|
|
|
1.9.35 |
|
|
|
|
|
|
1.9.36 |
|
|
|
|
|
|
1.9.37 |
|
|
|
|
|
|
1.9.38 |
|
|
|
|
|
|
1.9.39 |
|
|
|
|
|
|
1.9.40 |
|
|
|
|
|
|