Version |
Insecure |
CryptoMisuse |
Rule name |
Method |
Statement |
Details |
1.46 |
|
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r29.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Mac |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
virtualinvoke r9.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r8, r6) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
r8 = virtualinvoke r5.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r7) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
KeyStore |
org.bouncycastle.jce.examples.PKCS12Example.main([Ljava/lang/String;)V |
virtualinvoke r16.<java.security.KeyStore: void store(java.io.OutputStream,char[])>(r17, $r65) |
Unexpected call to method store on object of type java.security.KeyStore. Expect a call to one of the following methods getKey,getEntry |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r50.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r41, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r22, $r7) |
First parameter (with value "RC5-64") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r16.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r15) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r16.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r15) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEBlockCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r92.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r93, $i16) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEElGamalCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10599, $r4) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEIESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r6 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r1, $r5) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCERSACipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10732, $r4) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DES.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer10836) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r8.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r8.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11059, $r6) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DH.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11062, $r8) |
First parameter (with value "DH") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DSA.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11067, $r8) |
First parameter (with value "DSA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$ElGamal.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11073, $r8) |
First parameter (with value "ElGamal") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$GOST3410.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11077, $r8) |
First parameter (with value "GOST3410") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r17 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11081, $r7) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r17 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11082, $r3) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$IVAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PBKDF2.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PKCS12PBE.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$RC2AlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, $r10) |
First parameter (with value "PBEWithSHAAndTwofish-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r11 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r18) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r9.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r9 = virtualinvoke $r8.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r49) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String,java.lang.String)>(r1, $r8) |
First parameter (with value "PBEWithSHAAndTwofish-CBC") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r40.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
staticinvoke <org.bouncycastle.util.io.Streams: int readFully(java.io.InputStream,byte[])>(r6, r10) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r13.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r24.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r31.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r25.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r45.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r32.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r22 = virtualinvoke r10.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer11440, varReplacer11441) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r8, r7) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Mac |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r7, r5) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r13 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r19 = virtualinvoke r29.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r9 = virtualinvoke r30.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r15.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
Second parameter (with value 1024)Variable iterationCountmust be at least 10000 |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r16.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r17, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r17.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r18, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
$r15 = virtualinvoke r23.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r12, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKPSSSigner.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11537, $r4) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.WrapCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r80.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r65, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r3.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.asymmetric.ec.KeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r6.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r20, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r2.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r7) |
First parameter was not properly generated as prepared I V |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12780, $r6) |
First parameter (with value "CAST5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12819, $r6) |
First parameter (with value "Camellia") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.symmetric.DESede$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer12890) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12973, $r6) |
First parameter (with value "Noekeon") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12986, $r6) |
First parameter (with value "RC5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13018, $r6) |
First parameter (with value "RC6") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13043, $r6) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.mozilla.SignedPublicKeyAndChallenge.verify(Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r2) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPResp.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.CertificateID.<init>(Ljava/lang/String;Ljava/security/cert/X509Certificate;Ljava/math/BigInteger;Ljava/lang/String;)V |
virtualinvoke r29.<java.security.MessageDigest: void update(byte[])>($r19) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReq.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
virtualinvoke r103.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>(varReplacer13600, r102, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
virtualinvoke r103.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>(varReplacer13600, r102, r3) |
Third parameter was not properly generated as prepared Alg |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
virtualinvoke r109.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(varReplacer13601, $r53, r108) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
virtualinvoke r118.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(varReplacer13603, $r31, r117) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
PBEKeySpec |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
$r31 = virtualinvoke r116.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r115) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
$r53 = virtualinvoke r107.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r106) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
specialinvoke $r22.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>($r25) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>($r47) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
specialinvoke $r27.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r28, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
specialinvoke $r49.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r50, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/security/Provider;[B[CLjava/lang/String;[B)[B |
virtualinvoke r28.<javax.crypto.Cipher: void init(int,java.security.Key)>(b0, r19) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/security/Provider;[B[CLjava/lang/String;[B)[B |
virtualinvoke r28.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r19, r37) |
Second parameter was not properly generated as generated Key |
- |
- |
|
IvParameterSpec |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/security/Provider;[B[CLjava/lang/String;[B)[B |
specialinvoke r30.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r4) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.openssl.PEMUtilities.generateSecretKeyForPKCS5Scheme2(Ljava/lang/String;[C[BI)Ljavax/crypto/SecretKey; |
specialinvoke $r6.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r9, r0) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.openssl.PEMUtilities.getKey([CLjava/lang/String;I[BZ)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PKCS8Generator.<init>(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/lang/String;)V |
specialinvoke r0.<org.bouncycastle.openssl.PKCS8Generator: void init(java.security.PrivateKey,java.lang.String,java.security.Provider)>(r1, r2, r4) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.openssl.PKCS8Generator.<init>(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/lang/String;)V |
specialinvoke r0.<org.bouncycastle.openssl.PKCS8Generator: void init(java.security.PrivateKey,java.lang.String,java.security.Provider)>(r1, r2, r4) |
Operation on object of type javax.crypto.SecretKeyFactory object not completed. Expected call to translateKey, generateSecret |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PKCS8Generator.<init>(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/Provider;)V |
specialinvoke r0.<org.bouncycastle.openssl.PKCS8Generator: void init(java.security.PrivateKey,java.lang.String,java.security.Provider)>(r1, r2, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.openssl.PKCS8Generator.<init>(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/Provider;)V |
specialinvoke r0.<org.bouncycastle.openssl.PKCS8Generator: void init(java.security.PrivateKey,java.lang.String,java.security.Provider)>(r1, r2, r3) |
Operation on object of type javax.crypto.SecretKeyFactory object not completed. Expected call to translateKey, generateSecret |
- |
- |
|
PBEKeySpec |
org.bouncycastle.openssl.PKCS8Generator.generate()Lorg/bouncycastle/util/io/pem/PemObject; |
$r22 = virtualinvoke $r20.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r81) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.openssl.PKCS8Generator.generate()Lorg/bouncycastle/util/io/pem/PemObject; |
specialinvoke r103.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>($r18) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.openssl.PKCS8Generator.generate()Lorg/bouncycastle/util/io/pem/PemObject; |
specialinvoke r104.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r80, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
1.47 |
|
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dh.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9761, $r8) |
First parameter (with value "DH") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.dh.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.dh.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dsa.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9840, $r8) |
First parameter (with value "DSA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r6.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r20, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.elgamal.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10182, $r8) |
First parameter (with value "ElGamal") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.elgamal.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10209, $r4) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.gost.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10261, $r8) |
First parameter (with value "GOST3410") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.rsa.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10405, $r4) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.rsa.PSSSignatureSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10559, $r4) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.util.BaseCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r70.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r57, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r2.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r7) |
First parameter was not properly generated as prepared I V |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11039, $r6) |
First parameter (with value "CAST5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11078, $r6) |
First parameter (with value "Camellia") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.DES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11136, $r6) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.DES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DES$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer11145) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DES$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.DESede$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11194, $r6) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer11209) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.GOST28147$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11292, $r6) |
First parameter (with value "GOST28147") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.GOST28147$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11346, $r6) |
First parameter (with value "Noekeon") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r17 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11360, $r3) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r17 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11361, $r7) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11402, $r6) |
First parameter (with value "RC5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11434, $r6) |
First parameter (with value "RC6") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11459, $r6) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseAlgorithmParameters$PBKDF2.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseAlgorithmParameters$PKCS12PBE.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseAlgorithmParameters$RC2AlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r16.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r15) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r16.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r15) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r95.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r96, $i16) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseSecretKeyFactory$DES.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer11712) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r8.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r8.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseWrapCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r70.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r57, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.IvAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r29.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Mac |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
virtualinvoke r9.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r8, r6) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
r8 = virtualinvoke r5.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r7) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
KeyStore |
org.bouncycastle.jce.examples.PKCS12Example.main([Ljava/lang/String;)V |
virtualinvoke r16.<java.security.KeyStore: void store(java.io.OutputStream,char[])>(r17, $r65) |
Unexpected call to method store on object of type java.security.KeyStore. Expect a call to one of the following methods getKey,getEntry |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r50.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r41, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r22, $r7) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r16.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r15) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r16.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r15) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEBlockCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r95.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r96, $i16) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEIESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r6 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r1, $r5) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DES.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer13028) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r8.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r8.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PBKDF2.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PKCS12PBE.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, $r10) |
First parameter (with value "OldPBEWithSHAAndTwofish-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r11 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r18) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r9.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r9 = virtualinvoke $r8.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r49) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String,java.lang.String)>(r1, $r8) |
First parameter (with value "OldPBEWithSHAAndTwofish-CBC") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r40.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r7.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r1) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
staticinvoke <org.bouncycastle.util.io.Streams: int readFully(java.io.InputStream,byte[])>(r6, r10) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r12.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r24.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r31.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r25.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r45.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r32.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r20 = virtualinvoke r10.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer13389, varReplacer13390) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r8, r7) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Mac |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r7, r5) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r13 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r17 = virtualinvoke r27.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r9 = virtualinvoke r28.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r13.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
Second parameter (with value 1024)Variable iterationCountmust be at least 10000 |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r15, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r15.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r16, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
$r15 = virtualinvoke r23.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r12, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r14.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPResp.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.CertificateID.<init>(Ljava/lang/String;Ljava/security/cert/X509Certificate;Ljava/math/BigInteger;Ljava/lang/String;)V |
virtualinvoke r29.<java.security.MessageDigest: void update(byte[])>($r19) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReq.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.OCSPUtil.createDigestInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/MessageDigest; |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String,java.lang.String)>(r0, r1) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.OCSPUtil.createDigestInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/MessageDigest; |
$r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r0) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.getSignatureInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/Signature; |
$r3 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.lang.String)>(r0, r1) |
First parameter (with value "SHA1WithRSAEncryption") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
1.48 |
|
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dh.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10345, $r8) |
First parameter (with value "DH") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dh.IESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10393, $r4) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.dh.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.dh.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dsa.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10465, $r8) |
First parameter (with value "DSA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.dstu.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r9 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.ec.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10689, $r4) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r10 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.ec.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r9) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r17 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.ec.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r16) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r19 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.ec.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r6.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r20, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r22 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.ec.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r21) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r7 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.ec.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r6) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r2 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.ec.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.ec.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jce.provider.GOST3410Util: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.elgamal.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10945, $r8) |
First parameter (with value "ElGamal") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.elgamal.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10970, $r4) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.gost.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11020, $r8) |
First parameter (with value "GOST3410") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r0.<org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi: void engineInitSign(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.rsa.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11167, $r4) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.rsa.PSSSignatureSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11321, $r4) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.util.BaseCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r70.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r57, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r2.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r7) |
First parameter was not properly generated as prepared I V |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11863, $r6) |
First parameter (with value "CAST5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11902, $r6) |
First parameter (with value "Camellia") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.DES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11960, $r6) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.DES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DES$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer11969) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DES$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.DESede$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12018, $r6) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer12033) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.GOST28147$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12116, $r6) |
First parameter (with value "GOST28147") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.GOST28147$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12170, $r6) |
First parameter (with value "Noekeon") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r17 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12184, $r7) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r17 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12185, $r3) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12226, $r6) |
First parameter (with value "RC5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12258, $r6) |
First parameter (with value "RC6") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12283, $r6) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseAlgorithmParameters$PBKDF2.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseAlgorithmParameters$PKCS12PBE.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseAlgorithmParameters$RC2AlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r22, $r7) |
First parameter (with value "Twofish") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r16.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r15) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r16.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r15) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r95.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r96, $i16) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseSecretKeyFactory$DES.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer12536) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r8.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r8.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseWrapCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r62.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r50, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.IvAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r29.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Mac |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
virtualinvoke r9.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r8, r6) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
r8 = virtualinvoke r5.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r7) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
KeyStore |
org.bouncycastle.jce.examples.PKCS12Example.main([Ljava/lang/String;)V |
virtualinvoke r16.<java.security.KeyStore: void store(java.io.OutputStream,char[])>(r17, $r65) |
Unexpected call to method store on object of type java.security.KeyStore. Expect a call to one of the following methods getKey,getEntry |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r7 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r14, $r6) |
First parameter (with value "CAST6") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r50.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r41, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r22, $r7) |
First parameter (with value "DESede") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r16.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r15) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r16.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r15) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEBlockCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r95.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r96, $i16) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r63.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEIESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r6 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r1, $r5) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jce.provider.JCEIESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
r29 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.ec.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DES.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer13861) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r8.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r8.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r63.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PBKDF2.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PKCS12PBE.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, $r10) |
First parameter (with value "OldPBEWithSHAAnd3-KeyTripleDES-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r11 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r18) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r9.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r9 = virtualinvoke $r8.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r49) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String,java.lang.String)>(r1, $r8) |
First parameter (with value "OldPBEWithSHAAnd3-KeyTripleDES-CBC") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r40.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r7.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r1) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
staticinvoke <org.bouncycastle.util.io.Streams: int readFully(java.io.InputStream,byte[])>(r6, r10) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r12.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r24.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r31.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r25.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r45.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r32.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r20 = virtualinvoke r10.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer14236, varReplacer14237) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r8, r7) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Mac |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r7, r5) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r13 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r17 = virtualinvoke r27.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r9 = virtualinvoke r28.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r13.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
Second parameter (with value 1024)Variable iterationCountmust be at least 10000 |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r15, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r15.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r16, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
$r15 = virtualinvoke r23.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r12, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r14.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPResp.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.CertificateID.<init>(Ljava/lang/String;Ljava/security/cert/X509Certificate;Ljava/math/BigInteger;Ljava/lang/String;)V |
virtualinvoke r29.<java.security.MessageDigest: void update(byte[])>($r19) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReq.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.OCSPUtil.createDigestInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/MessageDigest; |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String,java.lang.String)>(r0, r1) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.OCSPUtil.createDigestInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/MessageDigest; |
$r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r0) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.getSignatureInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/Signature; |
$r2 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r0) |
First parameter (with value "SHA1WithRSAEncryption") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.getSignatureInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/Signature; |
$r3 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.lang.String)>(r0, r1) |
First parameter (with value "SHA1WithRSAEncryption") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
1.49 |
|
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dh.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11739, varReplacer11740) |
First parameter (with value "DH") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dh.IESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11784, varReplacer11785) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.dh.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.dh.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dsa.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11857, varReplacer11858) |
First parameter (with value "DSA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.dstu.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r9 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.dstu.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r9 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12075, varReplacer12076) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r10 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r9) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r17 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r16) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r19 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r10 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r9) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r17 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r16) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r19 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r6.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r20, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r22 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r21) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r7 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r6) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r22 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r21) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r7 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r6) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r2 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r2 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.GOST3410Util: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.GOST3410Util: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.elgamal.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12333, varReplacer12334) |
First parameter (with value "ElGamal") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.elgamal.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12360, varReplacer12361) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.gost.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12415, varReplacer12416) |
First parameter (with value "GOST3410") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r0.<org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi: void engineInitSign(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r0.<org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi: void engineInitSign(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.ies.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r1, varReplacer12509) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ies.CipherSpi.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
r29 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ies.CipherSpi.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
r29 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.rsa.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12601, varReplacer12602) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.rsa.PSSSignatureSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12756, varReplacer12757) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.util.BaseCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r69.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r56, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jcajce.provider.asymmetric.x509.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r14.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jcajce.provider.asymmetric.x509.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, varReplacer13499) |
First parameter (with value "BrokenPBEWithSHAAnd3-KeyTripleDES-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r9 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r16) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r8.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r8 = virtualinvoke $r7.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r46) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String,java.lang.String)>(r1, varReplacer13500) |
First parameter (with value "BrokenPBEWithSHAAnd3-KeyTripleDES-CBC") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r37.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r7.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r1) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
staticinvoke <org.bouncycastle.util.io.Streams: int readFully(java.io.InputStream,byte[])>(r6, r10) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r12.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.<init>(Lorg/bouncycastle/jcajce/provider/keystore/bc/BcKeyStoreSpi;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.<init>(Lorg/bouncycastle/jcajce/provider/keystore/bc/BcKeyStoreSpi;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r26.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r33.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r27.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r45.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r34.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r36 = virtualinvoke r64.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer13553, varReplacer13554) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r48 = virtualinvoke r7.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer13559, varReplacer13560) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r8, r7) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r31.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r35) |
First parameter was not properly generated as randomized |
- |
- |
|
Mac |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r7, r5) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r13 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r17 = virtualinvoke r27.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r6 = virtualinvoke r59.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r58) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r63 = virtualinvoke r5.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>($r22) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r22.<javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>(r3, $r23, $i0, $i1) |
Second parameter was not properly generated as randomized |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r39.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
Second parameter (with value 1024)Variable iterationCountmust be at least 10000 |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r15, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r42.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r43, $i2) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r63 = virtualinvoke r5.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>($r22) |
First parameter was not properly generated as specced Key |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
$r15 = virtualinvoke r23.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r12, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r2.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14023, varReplacer14024) |
First parameter (with value "CAST5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14066, varReplacer14067) |
First parameter (with value "Camellia") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.DES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14128, varReplacer14129) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.DES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DES$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer14140) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DES$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.DESede$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14249, varReplacer14250) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer14265) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.GOST28147$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14400, varReplacer14401) |
First parameter (with value "GOST28147") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.GOST28147$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14455, varReplacer14456) |
First parameter (with value "Noekeon") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.PBEPBKDF2$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.PBEPKCS12$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14493, varReplacer14494) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14495, varReplacer14496) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14631, varReplacer14632) |
First parameter (with value "RC5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14664, varReplacer14665) |
First parameter (with value "RC6") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14693, varReplacer14694) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r14.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r13) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r14.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r13) |
First parameter was not properly generated as prepared I V |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseWrapCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r61.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r49, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.IvAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r29.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Mac |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
virtualinvoke r9.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r8, r6) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
r8 = virtualinvoke r5.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r7) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
KeyStore |
org.bouncycastle.jce.examples.PKCS12Example.main([Ljava/lang/String;)V |
virtualinvoke r16.<java.security.KeyStore: void store(java.io.OutputStream,char[])>(r17, $r65) |
Unexpected call to method store on object of type java.security.KeyStore. Expect a call to one of the following methods getKey,getEntry |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r49.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r40, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r62.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r14.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPResp.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.CertificateID.<init>(Ljava/lang/String;Ljava/security/cert/X509Certificate;Ljava/math/BigInteger;Ljava/lang/String;)V |
virtualinvoke r29.<java.security.MessageDigest: void update(byte[])>($r19) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReq.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.OCSPUtil.createDigestInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/MessageDigest; |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String,java.lang.String)>(r0, r1) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.OCSPUtil.createDigestInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/MessageDigest; |
$r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r0) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.getSignatureInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/Signature; |
$r2 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r0) |
First parameter (with value "SHA1WithRSAEncryption") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.getSignatureInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/Signature; |
$r3 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.lang.String)>(r0, r1) |
First parameter (with value "SHA1WithRSAEncryption") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
1.50 |
|
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dh.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12833, varReplacer12834) |
First parameter (with value "DH") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dh.IESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12876, varReplacer12877) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.dh.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.dh.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dsa.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12953, varReplacer12954) |
First parameter (with value "DSA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.dstu.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r9 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.dstu.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r9 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13163, varReplacer13164) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r10 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r9) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r17 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r16) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r19 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r10 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r9) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r17 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r16) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r19 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r6.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r20, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r22 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r21) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r7 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r6) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r22 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r21) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r7 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r6) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r2 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r2 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.GOST3410Util: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.GOST3410Util: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.elgamal.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13426, varReplacer13427) |
First parameter (with value "ElGamal") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.elgamal.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13452, varReplacer13453) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.gost.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13506, varReplacer13507) |
First parameter (with value "GOST3410") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r0.<org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi: void engineInitSign(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r0.<org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi: void engineInitSign(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.ies.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r1, varReplacer13601) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ies.CipherSpi.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
r29 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ies.CipherSpi.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
r29 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.rsa.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13693, varReplacer13694) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.rsa.PSSSignatureSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13848, varReplacer13849) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.util.BaseCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r69.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r56, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jcajce.provider.asymmetric.x509.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r14.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jcajce.provider.asymmetric.x509.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, varReplacer14835) |
First parameter (with value "PBEWithSHAAnd3-KeyTripleDES-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r9 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r16) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r8.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r8 = virtualinvoke $r7.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r46) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String,java.lang.String)>(r1, varReplacer14836) |
First parameter (with value "PBEWithSHAAnd3-KeyTripleDES-CBC") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r37.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r7.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r1) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
staticinvoke <org.bouncycastle.util.io.Streams: int readFully(java.io.InputStream,byte[])>(r6, r10) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r12.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.<init>(Lorg/bouncycastle/jcajce/provider/keystore/bc/BcKeyStoreSpi;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.<init>(Lorg/bouncycastle/jcajce/provider/keystore/bc/BcKeyStoreSpi;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r26.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r33.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r27.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r45.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r34.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r17 = virtualinvoke r39.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer14903, varReplacer14904) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r29 = virtualinvoke r9.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer14901, varReplacer14902) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r7.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(i0, r39, $r29) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r7.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(i0, r39, $r29) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r7.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(i0, r39, $r32) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r7.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(i0, r39, $r32) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r7, r6) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r32.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r34) |
First parameter was not properly generated as randomized |
- |
- |
|
Mac |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r7, r5) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r13 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r24 = virtualinvoke r43.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r39 = virtualinvoke r6.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>($r35) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r8 = virtualinvoke r6.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r18.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r20.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r35.<javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>(r1, $r36, $i3, $i4) |
Second parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
Second parameter (with value 1024)Variable iterationCountmust be at least 10000 |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r21.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r22, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r23.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r24, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r39 = virtualinvoke r6.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>($r19) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r39 = virtualinvoke r6.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>($r35) |
First parameter was not properly generated as specced Key |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
$r15 = virtualinvoke r23.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r12, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r2.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer15405, varReplacer15406) |
First parameter (with value "CAST5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer15453, varReplacer15454) |
First parameter (with value "Camellia") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.DES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer15527, varReplacer15528) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.DES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DES$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer15539) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DES$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.DESede$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer15648, varReplacer15649) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer15664) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.GOST28147$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer15799, varReplacer15800) |
First parameter (with value "GOST28147") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.GOST28147$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.IDEA$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer15855, varReplacer15856) |
First parameter (with value "IDEA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.IDEA$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.IDEA$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer15914, varReplacer15915) |
First parameter (with value "Noekeon") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.PBEPBKDF2$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.PBEPKCS12$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer15971, varReplacer15972) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer15973, varReplacer15974) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16109, varReplacer16110) |
First parameter (with value "RC5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16142, varReplacer16143) |
First parameter (with value "RC6") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16176, varReplacer16177) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.Shacal2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16237, varReplacer16238) |
First parameter (with value "Shacal2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Shacal2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r6 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16431, varReplacer16432) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r22.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r21) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r22.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r21) |
First parameter was not properly generated as prepared I V |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r34.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r35, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseWrapCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r61.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r49, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.IvAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r29.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Mac |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
virtualinvoke r9.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r8, r6) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
r8 = virtualinvoke r5.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r7) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
KeyStore |
org.bouncycastle.jce.examples.PKCS12Example.main([Ljava/lang/String;)V |
virtualinvoke r16.<java.security.KeyStore: void store(java.io.OutputStream,char[])>(r17, $r65) |
Unexpected call to method store on object of type java.security.KeyStore. Expect a call to one of the following methods getKey,getEntry |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r49.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r40, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r62.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r14.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPResp.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.CertificateID.<init>(Ljava/lang/String;Ljava/security/cert/X509Certificate;Ljava/math/BigInteger;Ljava/lang/String;)V |
virtualinvoke r29.<java.security.MessageDigest: void update(byte[])>($r19) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReq.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.OCSPUtil.createDigestInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/MessageDigest; |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String,java.lang.String)>(r0, r1) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.OCSPUtil.createDigestInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/MessageDigest; |
$r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r0) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
1.51 |
|
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dh.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13455, varReplacer13456) |
First parameter (with value "DH") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dh.IESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13499, varReplacer13500) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.dh.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.dh.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.dsa.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13577, varReplacer13578) |
First parameter (with value "DSA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.dstu.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r9 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.dstu.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r9 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13790, varReplacer13791) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r12 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r11) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r19 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r21 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r20) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r12 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r11) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r19 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r21 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r20) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r27, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r22 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r21) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r7 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r6) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r22 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r21) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r7 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r6) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r2 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r2 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.GOST3410Util: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.GOST3410Util: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.elgamal.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14065, varReplacer14066) |
First parameter (with value "ElGamal") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.elgamal.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14092, varReplacer14093) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.gost.AlgorithmParameterGeneratorSpi.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14145, varReplacer14146) |
First parameter (with value "GOST3410") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r0.<org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi: void engineInitSign(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r0.<org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi: void engineInitSign(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.ies.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r1, varReplacer14241) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ies.CipherSpi.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
r29 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ies.CipherSpi.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
r29 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.rsa.CipherSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14333, varReplacer14334) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.asymmetric.rsa.PSSSignatureSpi.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer14488, varReplacer14489) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.util.BaseCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r69.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r56, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jcajce.provider.asymmetric.x509.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r14.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jcajce.provider.asymmetric.x509.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, varReplacer15476) |
First parameter (with value "PBEWithSHAAndTwofish-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r9 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r16) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r8.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r8 = virtualinvoke $r7.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r46) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String,java.lang.String)>(r1, varReplacer15475) |
First parameter (with value "PBEWithSHAAndTwofish-CBC") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r37.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r7.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r1) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
staticinvoke <org.bouncycastle.util.io.Streams: int readFully(java.io.InputStream,byte[])>(r6, r10) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r12.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.<init>(Lorg/bouncycastle/jcajce/provider/keystore/bc/BcKeyStoreSpi;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.<init>(Lorg/bouncycastle/jcajce/provider/keystore/bc/BcKeyStoreSpi;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r26.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r33.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r27.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r45.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r34.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r17 = virtualinvoke r39.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer15545, varReplacer15546) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r29 = virtualinvoke r9.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer15542, varReplacer15543) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r7.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(i0, r39, $r29) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r7.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(i0, r39, $r29) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r7.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(i0, r39, $r32) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r7.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(i0, r39, $r32) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r7, r6) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r32.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r34) |
First parameter was not properly generated as randomized |
- |
- |
|
Mac |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r7, r5) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r13 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r24 = virtualinvoke r43.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r39 = virtualinvoke r6.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>($r35) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r8 = virtualinvoke r6.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r18.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r20.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r35.<javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>(r1, $r36, $i3, $i4) |
Second parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r21.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r22, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r23.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r24, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r39 = virtualinvoke r6.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>($r19) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r39 = virtualinvoke r6.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>($r35) |
First parameter was not properly generated as specced Key |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
$r15 = virtualinvoke r23.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r12, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r2.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16048, varReplacer16049) |
First parameter (with value "CAST5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16096, varReplacer16097) |
First parameter (with value "Camellia") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.DES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16170, varReplacer16171) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.DES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DES$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer16182) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DES$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.DESede$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16291, varReplacer16292) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer16307) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.GOST28147$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16442, varReplacer16443) |
First parameter (with value "GOST28147") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.GOST28147$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.IDEA$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16498, varReplacer16499) |
First parameter (with value "IDEA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.IDEA$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.IDEA$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16557, varReplacer16558) |
First parameter (with value "Noekeon") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.PBEPBKDF2$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.PBEPKCS12$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16614, varReplacer16615) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16616, varReplacer16617) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16752, varReplacer16753) |
First parameter (with value "RC5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16785, varReplacer16786) |
First parameter (with value "RC6") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16819, varReplacer16820) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.Shacal2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer16880, varReplacer16881) |
First parameter (with value "Shacal2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Shacal2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r6 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer17085, varReplacer17086) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r22.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r21) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r22.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r21) |
First parameter was not properly generated as prepared I V |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r34.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r35, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseWrapCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r61.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r49, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.IvAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r29.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Mac |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
virtualinvoke r9.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r8, r6) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
r8 = virtualinvoke r5.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r7) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r49.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r40, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r62.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r14.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/ASN1ObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/ASN1ObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/ASN1ObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/ASN1ObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
1.52 |
|
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.dh.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.dh.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.dstu.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r9 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.dstu.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r9 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r12 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r11) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r19 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r21 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r20) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r12 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r11) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r19 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r18) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.IESCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
$r21 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r20) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r27, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r22 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r21) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r7 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r6) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r22 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r21) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.KeyAgreementSpi.initFromKey(Ljava/security/Key;)V |
$r7 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r6) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r2 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ec.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r2 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.GOST3410Util: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ecgost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;)V |
r8 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.GOST3410Util: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r0.<org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi: void engineInitSign(java.security.PrivateKey)>(r1) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi.engineInitSign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r0.<org.bouncycastle.jcajce.provider.asymmetric.gost.SignatureSpi: void engineInitSign(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DHParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ies.CipherSpi.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
r29 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r5) |
Operation on object of type javax.crypto.spec.DHParameterSpec object not completed. Expected call to <init> |
- |
- |
|
DSAParameterSpec |
org.bouncycastle.jcajce.provider.asymmetric.ies.CipherSpi.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
r29 = staticinvoke <org.bouncycastle.jcajce.provider.asymmetric.util.ECUtil: org.bouncycastle.crypto.params.AsymmetricKeyParameter generatePrivateKeyParameter(java.security.PrivateKey)>($r5) |
Operation on object of type java.security.spec.DSAParameterSpec object not completed. Expected call to <init> |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.asymmetric.util.BaseCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r70.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r57, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jcajce.provider.asymmetric.x509.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r14.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jcajce.provider.asymmetric.x509.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r6.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(i0, $r11, r5) |
Second parameter was not properly generated as generated Key |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r11 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r18) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r9.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r40.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r7.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r1) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
staticinvoke <org.bouncycastle.util.io.Streams: int readFully(java.io.InputStream,byte[])>(r6, r10) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r12.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.<init>(Lorg/bouncycastle/jcajce/provider/keystore/bc/BcKeyStoreSpi;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.<init>(Lorg/bouncycastle/jcajce/provider/keystore/bc/BcKeyStoreSpi;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r26.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r33.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r27.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r45.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r34.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r17 = virtualinvoke r39.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer15831, varReplacer15832) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r29 = virtualinvoke r9.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer15826, varReplacer15827) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r7.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(i0, r39, $r29) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r7.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(i0, r39, $r32) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r7, r6) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(varReplacer15830, r8, r7) |
Second parameter was not properly generated as generated Key |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r32.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r34) |
First parameter was not properly generated as randomized |
- |
- |
|
Mac |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r9.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r8, r6) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r14 = virtualinvoke r5.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r7) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
$r24 = virtualinvoke r43.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r39 = virtualinvoke r6.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>($r35) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
r8 = virtualinvoke r6.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r13.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r18.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r20.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r35.<javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>(r1, $r36, $i3, $i4) |
Second parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r12.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r2, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r12.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r2, i0) |
Second parameter (with value 1024)Variable iterationCountmust be at least 10000 |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r21.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r22, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r23.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r24, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
virtualinvoke r8.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(varReplacer15833, $r15, r7) |
Second parameter was not properly generated as generated Key |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
$r15 = virtualinvoke r23.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r12, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.DES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DES$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer16518) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DES$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer16642) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.GOST28147$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.IDEA$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.IDEA$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.PBEPBKDF2$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.PBEPKCS12$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC2$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.Shacal2$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r15 = virtualinvoke r0.<org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher: java.security.AlgorithmParameters createParametersInstance(java.lang.String)>(r31) |
Operation on object of type java.security.AlgorithmParameters object not completed. Expected call to init |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r6 = virtualinvoke r0.<org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher: java.security.AlgorithmParameters createParametersInstance(java.lang.String)>(varReplacer17407) |
Operation on object of type java.security.AlgorithmParameters object not completed. Expected call to init |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r34.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r35, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jcajce.provider.symmetric.util.BaseWrapCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r62.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r50, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jcajce.provider.symmetric.util.IvAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.util.DefaultJcaJceHelper.createCipher(Ljava/lang/String;)Ljavax/crypto/Cipher; |
$r2 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String)>(r1) |
First parameter (with value "PBEWithSHAAnd3-KeyTripleDES-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.util.NamedJcaJceHelper.createCipher(Ljava/lang/String;)Ljavax/crypto/Cipher; |
$r3 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, $r2) |
First parameter (with value "PBEWithSHAAnd3-KeyTripleDES-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Cipher |
org.bouncycastle.jcajce.util.ProviderJcaJceHelper.createCipher(Ljava/lang/String;)Ljavax/crypto/Cipher; |
$r3 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.security.Provider)>(r1, $r2) |
First parameter (with value "PBEWithSHAAnd3-KeyTripleDES-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r29.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Mac |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
virtualinvoke r9.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r8, r6) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
r8 = virtualinvoke r5.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r7) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r49.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r40, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r14.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/ASN1ObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/ASN1ObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/ASN1ObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/ASN1ObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
1.53 |
|
|
|
|
|
|
1.54 |
|
|
|
|
|
|
1.55 |
|
|
|
|
|
|
1.56 |
|
|
|
|
|
|
1.57 |
|
|
|
|
|
|
1.58 |
|
|
|
|
|
|
1.59 |
|
|
|
|
|
|
1.60 |
|
|
|
|
|
|