Version |
Insecure |
CryptoMisuse |
Rule name |
Method |
Statement |
Details |
1.38 |
|
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r47.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r28.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS7SignedData.<init>(Ljava/security/PrivateKey;[Ljava/security/cert/Certificate;Ljava/lang/String;)V |
specialinvoke r0.<org.bouncycastle.jce.PKCS7SignedData: void <init>(java.security.PrivateKey,java.security.cert.Certificate[],java.lang.String,java.lang.String)>(r1, r2, r3, varReplacer7438) |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS7SignedData.<init>([B)V |
specialinvoke r0.<org.bouncycastle.jce.PKCS7SignedData: void <init>(byte[],java.lang.String)>(r1, varReplacer7422) |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, initVerify |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V1CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r34.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V1CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r34.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V2CRLGenerator.generateX509CRL(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509CRL; |
virtualinvoke r44.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V2CRLGenerator.generateX509CRL(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509CRL; |
virtualinvoke r44.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V3CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r41.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V3CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r41.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
KeyStore |
org.bouncycastle.jce.examples.PKCS12Example.main([Ljava/lang/String;)V |
virtualinvoke r16.<java.security.KeyStore: void store(java.io.OutputStream,char[])>(r17, $r65) |
Unexpected call to method store on object of type java.security.KeyStore. Expect a call to one of the following methods getKey,getEntry |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r6 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r13, varReplacer9046) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r49.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r40, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r7 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r20, varReplacer9198) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r14.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r13) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r14.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r13) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEBlockCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r88.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r89, $i16) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r18.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r7, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEElGamalCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9398, varReplacer9399) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEIESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r1, varReplacer9448) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator$DESede.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator$DESede.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCERSACipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9581, varReplacer9582) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DES.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer9681) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DESede.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer9695) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9926, varReplacer9927) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DH.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9932, varReplacer9933) |
First parameter (with value "DH") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DSA.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9938, varReplacer9939) |
First parameter (with value "DSA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$ElGamal.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9943, varReplacer9944) |
First parameter (with value "ElGamal") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$GOST3410.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9949, varReplacer9950) |
First parameter (with value "GOST3410") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$IDEA.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9952, varReplacer9953) |
First parameter (with value "IDEA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$IDEA.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9956, varReplacer9957) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9958, varReplacer9959) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$IDEAAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$IVAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PKCS12PBE.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$RC2AlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, varReplacer10363) |
First parameter (with value "OldPBEWithSHAAndTwofish-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r9 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r16) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r8.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r8 = virtualinvoke $r7.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r46) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String,java.lang.String)>(r1, varReplacer10365) |
First parameter (with value "OldPBEWithSHAAndTwofish-CBC") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r37.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r13.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r20) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
$i6 = virtualinvoke r5.<javax.crypto.CipherInputStream: int read()>() |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to <javax.crypto.CipherInputStream: int read(byte[],int,int)>, <javax.crypto.CipherInputStream: int read()>, <javax.crypto.CipherInputStream: int read(byte[])>, close |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<org.bouncycastle.crypto.io.DigestInputStream: void <init>(java.io.InputStream,org.bouncycastle.crypto.Digest)>(r5, $r15) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read, close |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r13.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r26.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r33.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r27.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r45.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r34.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r20 = virtualinvoke r10.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer10425, varReplacer10426) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r8, r7) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Mac |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r7, r5) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r12 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r18 = virtualinvoke r27.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r9 = virtualinvoke r28.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r15.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r10.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r15.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r16, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r16.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r17, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
$r13 = virtualinvoke r21.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r10.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r11, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKPSSSigner.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10521, varReplacer10522) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.WrapCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r79.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r64, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r3.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r2.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11439, varReplacer11440) |
First parameter (with value "CAST5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11472, varReplacer11473) |
First parameter (with value "Camellia") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11530, varReplacer11531) |
First parameter (with value "Noekeon") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11544, varReplacer11545) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.mozilla.SignedPublicKeyAndChallenge.verify(Ljava/lang/String;)Z |
virtualinvoke r12.<java.security.Signature: void initVerify(java.security.PublicKey)>(r2) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPResp.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r19.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r65.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r65.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.CertificateID.<init>(Ljava/lang/String;Ljava/security/cert/X509Certificate;Ljava/math/BigInteger;Ljava/lang/String;)V |
virtualinvoke r34.<java.security.MessageDigest: void update(byte[])>($r23) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReq.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r63.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r63.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.RespID.<init>(Ljava/security/PublicKey;)V |
r19 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer11967) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
virtualinvoke r33.<javax.crypto.Cipher: void init(int,java.security.Key)>(b0, r24) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
virtualinvoke r33.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r24, r43) |
Second parameter was not properly generated as generated Key |
- |
- |
|
IvParameterSpec |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
specialinvoke r35.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r4) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.openssl.PEMUtilities.getKey([CLjava/lang/String;I[BZ)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.getSignatureInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/Signature; |
$r2 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r0) |
First parameter (with value "SHA1WithRSAEncryption") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.getSignatureInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/Signature; |
$r3 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.lang.String)>(r0, r1) |
First parameter (with value "SHA1WithRSAEncryption") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
1.40 |
|
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r47.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r30.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS7SignedData.<init>(Ljava/security/PrivateKey;[Ljava/security/cert/Certificate;Ljava/lang/String;)V |
specialinvoke r0.<org.bouncycastle.jce.PKCS7SignedData: void <init>(java.security.PrivateKey,java.security.cert.Certificate[],java.lang.String,java.lang.String)>(r1, r2, r3, varReplacer7548) |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, initVerify |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS7SignedData.<init>([B)V |
specialinvoke r0.<org.bouncycastle.jce.PKCS7SignedData: void <init>(byte[],java.lang.String)>(r1, varReplacer7532) |
Operation on object of type java.security.Signature object not completed. Expected call to initVerify, update, verify |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V1CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r34.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V1CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r34.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V2CRLGenerator.generateX509CRL(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509CRL; |
virtualinvoke r44.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V2CRLGenerator.generateX509CRL(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509CRL; |
virtualinvoke r44.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V3CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r41.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V3CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r41.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
KeyStore |
org.bouncycastle.jce.examples.PKCS12Example.main([Ljava/lang/String;)V |
virtualinvoke r16.<java.security.KeyStore: void store(java.io.OutputStream,char[])>(r17, $r65) |
Unexpected call to method store on object of type java.security.KeyStore. Expect a call to one of the following methods getKey,getEntry |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r49.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r40, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r7 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r20, varReplacer9332) |
First parameter (with value "AES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r14.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r13) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r14.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r13) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEBlockCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r92.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r93, $i16) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r18.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r7, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEElGamalCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9531, varReplacer9532) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEIESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r1, varReplacer9581) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator$DESede.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator$DESede.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCERSACipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9712, varReplacer9713) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DES.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer9812) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DESede.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer9826) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10054, varReplacer10055) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DH.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10058, varReplacer10059) |
First parameter (with value "DH") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DSA.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10065, varReplacer10066) |
First parameter (with value "DSA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$ElGamal.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10072, varReplacer10073) |
First parameter (with value "ElGamal") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$GOST3410.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10075, varReplacer10076) |
First parameter (with value "GOST3410") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10081, varReplacer10082) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10083, varReplacer10084) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$IVAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PKCS12PBE.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$RC2AlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, varReplacer10432) |
First parameter (with value "OldPBEWithSHAAndTwofish-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r9 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r16) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r8.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r8 = virtualinvoke $r7.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r46) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String,java.lang.String)>(r1, varReplacer10433) |
First parameter (with value "OldPBEWithSHAAndTwofish-CBC") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r37.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r13.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r20) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
$i6 = virtualinvoke r5.<javax.crypto.CipherInputStream: int read()>() |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to <javax.crypto.CipherInputStream: int read(byte[],int,int)>, <javax.crypto.CipherInputStream: int read()>, <javax.crypto.CipherInputStream: int read(byte[])>, close |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<org.bouncycastle.crypto.io.DigestInputStream: void <init>(java.io.InputStream,org.bouncycastle.crypto.Digest)>(r5, $r15) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read, close |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r13.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r24.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r31.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r42.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r25.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r43.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r32.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r20 = virtualinvoke r10.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer10495, varReplacer10496) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r8, r7) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Mac |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r7, r5) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r12 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r18 = virtualinvoke r27.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r9 = virtualinvoke r28.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r15.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r10.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r15.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r16, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r16.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r17, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
$r13 = virtualinvoke r21.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r10.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r11, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKPSSSigner.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10583, varReplacer10584) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.WrapCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r79.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r64, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r3.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r2.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11545, varReplacer11546) |
First parameter (with value "CAST5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11579, varReplacer11580) |
First parameter (with value "Camellia") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11638, varReplacer11639) |
First parameter (with value "Noekeon") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11652, varReplacer11653) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.mozilla.SignedPublicKeyAndChallenge.verify(Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r2) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPResp.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r19.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r65.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r65.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.CertificateID.<init>(Ljava/lang/String;Ljava/security/cert/X509Certificate;Ljava/math/BigInteger;Ljava/lang/String;)V |
virtualinvoke r34.<java.security.MessageDigest: void update(byte[])>($r23) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReq.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r63.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r63.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.RespID.<init>(Ljava/security/PublicKey;)V |
r19 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer12077) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
virtualinvoke r33.<javax.crypto.Cipher: void init(int,java.security.Key)>(b0, r24) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
virtualinvoke r33.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r24, r43) |
Second parameter was not properly generated as generated Key |
- |
- |
|
IvParameterSpec |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
specialinvoke r35.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r4) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.openssl.PEMUtilities.getKey([CLjava/lang/String;I[BZ)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
1.43 |
|
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r47.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r30.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS7SignedData.<init>(Ljava/security/PrivateKey;[Ljava/security/cert/Certificate;[Ljava/security/cert/CRL;Ljava/lang/String;Ljava/lang/String;)V |
virtualinvoke $r22.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, update, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)> |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V1CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r34.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V1CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r34.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V2CRLGenerator.generateX509CRL(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509CRL; |
virtualinvoke r44.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V2CRLGenerator.generateX509CRL(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509CRL; |
virtualinvoke r44.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V3CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r41.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V3CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r41.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
KeyStore |
org.bouncycastle.jce.examples.PKCS12Example.main([Ljava/lang/String;)V |
virtualinvoke r16.<java.security.KeyStore: void store(java.io.OutputStream,char[])>(r17, $r65) |
Unexpected call to method store on object of type java.security.KeyStore. Expect a call to one of the following methods getKey,getEntry |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r6 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r13, varReplacer9620) |
First parameter (with value "DESede") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r49.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r40, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r14.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r13) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r14.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r13) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEBlockCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r92.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r93, $i16) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEElGamalCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer9972, varReplacer9973) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEIESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r1, varReplacer10022) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator$DESede.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator$DESede.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCERSACipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10153, varReplacer10154) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DES.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer10258) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DESede.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer10272) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10500, varReplacer10501) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DH.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10506, varReplacer10507) |
First parameter (with value "DH") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DSA.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10510, varReplacer10511) |
First parameter (with value "DSA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$ElGamal.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10516, varReplacer10517) |
First parameter (with value "ElGamal") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$GOST3410.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10522, varReplacer10523) |
First parameter (with value "GOST3410") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10527, varReplacer10528) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10529, varReplacer10530) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$IVAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PBKDF2.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PKCS12PBE.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$RC2AlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, varReplacer10843) |
First parameter (with value "PBEWithSHAAndTwofish-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r9 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r16) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r8.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r8 = virtualinvoke $r7.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r46) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String,java.lang.String)>(r1, varReplacer10845) |
First parameter (with value "PBEWithSHAAndTwofish-CBC") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r37.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r13.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r20) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
$i6 = virtualinvoke r5.<javax.crypto.CipherInputStream: int read()>() |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to <javax.crypto.CipherInputStream: int read(byte[],int,int)>, <javax.crypto.CipherInputStream: int read()>, <javax.crypto.CipherInputStream: int read(byte[])>, close |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<org.bouncycastle.crypto.io.DigestInputStream: void <init>(java.io.InputStream,org.bouncycastle.crypto.Digest)>(r5, $r15) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read, close |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r13.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r24.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r31.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r25.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r45.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r32.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r22 = virtualinvoke r10.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer10900, varReplacer10901) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r8, r7) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Mac |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r7, r5) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r13 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r19 = virtualinvoke r29.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r9 = virtualinvoke r30.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r15.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
Second parameter (with value 1024)Variable iterationCountmust be at least 10000 |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r16.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r17, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r17.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r18, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
$r15 = virtualinvoke r23.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r12, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKPSSSigner.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10984, varReplacer10985) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.WrapCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r79.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r64, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r3.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.asymmetric.ec.KeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r18.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.asymmetric.ec.KeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r7, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r2.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12160, varReplacer12161) |
First parameter (with value "CAST5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12194, varReplacer12195) |
First parameter (with value "Camellia") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12267, varReplacer12268) |
First parameter (with value "Noekeon") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12281, varReplacer12282) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.mozilla.SignedPublicKeyAndChallenge.verify(Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r2) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPResp.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r19.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r65.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r65.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.CertificateID.<init>(Ljava/lang/String;Ljava/security/cert/X509Certificate;Ljava/math/BigInteger;Ljava/lang/String;)V |
virtualinvoke r34.<java.security.MessageDigest: void update(byte[])>($r23) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReq.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r63.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r63.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.RespID.<init>(Ljava/security/PublicKey;)V |
r19 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer12706) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
virtualinvoke r28.<javax.crypto.Cipher: void init(int,java.security.Key)>(b0, r19) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
virtualinvoke r28.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r19, r37) |
Second parameter was not properly generated as generated Key |
- |
- |
|
IvParameterSpec |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
specialinvoke r30.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r4) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.openssl.PEMUtilities.getKey([CLjava/lang/String;I[BZ)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
1.44 |
|
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r41.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r29.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS7SignedData.<init>(Ljava/security/PrivateKey;[Ljava/security/cert/Certificate;Ljava/lang/String;)V |
specialinvoke r0.<org.bouncycastle.jce.PKCS7SignedData: void <init>(java.security.PrivateKey,java.security.cert.Certificate[],java.lang.String,java.lang.String)>(r1, r2, r3, varReplacer8150) |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS7SignedData.<init>([B)V |
specialinvoke r0.<org.bouncycastle.jce.PKCS7SignedData: void <init>(byte[],java.lang.String)>(r1, varReplacer8134) |
Operation on object of type java.security.Signature object not completed. Expected call to initVerify, update, verify |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V1CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r34.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V1CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r34.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V2CRLGenerator.generateX509CRL(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509CRL; |
virtualinvoke r44.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V2CRLGenerator.generateX509CRL(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509CRL; |
virtualinvoke r44.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V3CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r41.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V3CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r41.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
KeyStore |
org.bouncycastle.jce.examples.PKCS12Example.main([Ljava/lang/String;)V |
virtualinvoke r16.<java.security.KeyStore: void store(java.io.OutputStream,char[])>(r17, $r65) |
Unexpected call to method store on object of type java.security.KeyStore. Expect a call to one of the following methods getKey,getEntry |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r49.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r40, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r14.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r13) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r14.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r13) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEBlockCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r92.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r93, $i16) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEElGamalCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10108, varReplacer10109) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEIESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r1, varReplacer10158) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator$DESede.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator$DESede.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCERSACipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10289, varReplacer10290) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DES.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer10394) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DESede.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer10408) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10636, varReplacer10637) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DH.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10642, varReplacer10643) |
First parameter (with value "DH") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DSA.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10646, varReplacer10647) |
First parameter (with value "DSA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$ElGamal.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10653, varReplacer10654) |
First parameter (with value "ElGamal") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$GOST3410.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10658, varReplacer10659) |
First parameter (with value "GOST3410") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10663, varReplacer10664) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10665, varReplacer10666) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$IVAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PBKDF2.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PKCS12PBE.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$RC2AlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, varReplacer10973) |
First parameter (with value "PBEWithSHAAndTwofish-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r9 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r16) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r8.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r8 = virtualinvoke $r7.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r46) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String,java.lang.String)>(r1, varReplacer10975) |
First parameter (with value "PBEWithSHAAndTwofish-CBC") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r37.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
staticinvoke <org.bouncycastle.util.io.Streams: int readFully(java.io.InputStream,byte[])>(r6, r10) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r13.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r24.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r31.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r25.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r45.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r32.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r22 = virtualinvoke r10.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer11030, varReplacer11031) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r8, r7) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Mac |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r7, r5) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r13 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r19 = virtualinvoke r29.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r9 = virtualinvoke r30.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r15.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
Second parameter (with value 1024)Variable iterationCountmust be at least 10000 |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r16.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r17, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r17.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r18, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
$r15 = virtualinvoke r23.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r12, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKPSSSigner.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11119, varReplacer11120) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.WrapCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r79.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r64, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r3.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.asymmetric.ec.KeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r18.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.asymmetric.ec.KeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r5.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r7, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r2.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12304, varReplacer12305) |
First parameter (with value "CAST5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12338, varReplacer12339) |
First parameter (with value "Camellia") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12411, varReplacer12412) |
First parameter (with value "Noekeon") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12425, varReplacer12426) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.mozilla.SignedPublicKeyAndChallenge.verify(Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r2) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPResp.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r59.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r59.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.CertificateID.<init>(Ljava/lang/String;Ljava/security/cert/X509Certificate;Ljava/math/BigInteger;Ljava/lang/String;)V |
virtualinvoke r34.<java.security.MessageDigest: void update(byte[])>($r23) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReq.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.OCSPUtil.createDigestInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/MessageDigest; |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String,java.lang.String)>(r0, r1) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.OCSPUtil.createDigestInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/MessageDigest; |
$r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r0) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
virtualinvoke r28.<javax.crypto.Cipher: void init(int,java.security.Key)>(b0, r19) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
virtualinvoke r28.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r19, r37) |
Second parameter was not properly generated as generated Key |
- |
- |
|
IvParameterSpec |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
specialinvoke r30.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r4) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.openssl.PEMUtilities.getKey([CLjava/lang/String;I[BZ)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.getSignatureInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/Signature; |
$r2 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r0) |
First parameter (with value "SHA1WithRSAEncryption") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.getSignatureInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/Signature; |
$r3 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.lang.String)>(r0, r1) |
First parameter (with value "SHA1WithRSAEncryption") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
1.45 |
|
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r41.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r29.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS7SignedData.<init>(Ljava/security/PrivateKey;[Ljava/security/cert/Certificate;Ljava/lang/String;)V |
specialinvoke r0.<org.bouncycastle.jce.PKCS7SignedData: void <init>(java.security.PrivateKey,java.security.cert.Certificate[],java.lang.String,java.lang.String)>(r1, r2, r3, varReplacer8185) |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS7SignedData.<init>([B)V |
specialinvoke r0.<org.bouncycastle.jce.PKCS7SignedData: void <init>(byte[],java.lang.String)>(r1, varReplacer8169) |
Operation on object of type java.security.Signature object not completed. Expected call to initVerify, update, verify |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V1CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r34.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V1CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r34.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V2CRLGenerator.generateX509CRL(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509CRL; |
virtualinvoke r44.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V2CRLGenerator.generateX509CRL(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509CRL; |
virtualinvoke r44.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V3CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r41.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.X509V3CertificateGenerator.generateX509Certificate(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/SecureRandom;)Ljava/security/cert/X509Certificate; |
virtualinvoke r41.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
KeyStore |
org.bouncycastle.jce.examples.PKCS12Example.main([Ljava/lang/String;)V |
virtualinvoke r16.<java.security.KeyStore: void store(java.io.OutputStream,char[])>(r17, $r65) |
Unexpected call to method store on object of type java.security.KeyStore. Expect a call to one of the following methods getKey,getEntry |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r49.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r40, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r14.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r13) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r14.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r13) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEBlockCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r92.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r93, $i16) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEElGamalCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10180, varReplacer10181) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEIESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r1, varReplacer10230) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator$DESede.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator$DESede.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCERSACipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10361, varReplacer10362) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DES.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer10466) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DESede.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer10480) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r7.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r5) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10708, varReplacer10709) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DH.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10714, varReplacer10715) |
First parameter (with value "DH") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DSA.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10718, varReplacer10719) |
First parameter (with value "DSA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$ElGamal.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10726, varReplacer10727) |
First parameter (with value "ElGamal") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$GOST3410.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10729, varReplacer10730) |
First parameter (with value "GOST3410") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10735, varReplacer10736) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10737, varReplacer10738) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r14) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$IVAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PBKDF2.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PKCS12PBE.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$RC2AlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, varReplacer11045) |
First parameter (with value "PBEWithSHAAnd3-KeyTripleDES-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r9 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r16) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r8.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r8 = virtualinvoke $r7.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r46) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String,java.lang.String)>(r1, varReplacer11047) |
First parameter (with value "PBEWithSHAAnd3-KeyTripleDES-CBC") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r37.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
staticinvoke <org.bouncycastle.util.io.Streams: int readFully(java.io.InputStream,byte[])>(r6, r10) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r13.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r26.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r33.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r27.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r45.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r34.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r22 = virtualinvoke r10.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer11102, varReplacer11103) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r8, r7) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Mac |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r7, r5) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r13 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r19 = virtualinvoke r29.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r9 = virtualinvoke r30.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r15.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
Second parameter (with value 1024)Variable iterationCountmust be at least 10000 |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r16.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r17, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r17.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r18, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
$r15 = virtualinvoke r23.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r12, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKPSSSigner.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r4 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11191, varReplacer11192) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.WrapCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r79.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r64, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r3.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.asymmetric.ec.KeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r6.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r20, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r2.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12408, varReplacer12409) |
First parameter (with value "CAST5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12442, varReplacer12443) |
First parameter (with value "Camellia") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12515, varReplacer12516) |
First parameter (with value "Noekeon") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12529, varReplacer12530) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r6.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.mozilla.SignedPublicKeyAndChallenge.verify(Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r2) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPResp.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.CertificateID.<init>(Ljava/lang/String;Ljava/security/cert/X509Certificate;Ljava/math/BigInteger;Ljava/lang/String;)V |
virtualinvoke r29.<java.security.MessageDigest: void update(byte[])>($r19) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReq.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.OCSPUtil.createDigestInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/MessageDigest; |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String,java.lang.String)>(r0, r1) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.OCSPUtil.createDigestInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/MessageDigest; |
$r3 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r0) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
virtualinvoke r28.<javax.crypto.Cipher: void init(int,java.security.Key)>(b0, r19) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
virtualinvoke r28.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r19, r37) |
Second parameter was not properly generated as generated Key |
- |
- |
|
IvParameterSpec |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/lang/String;[B[CLjava/lang/String;[B)[B |
specialinvoke r30.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r4) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.openssl.PEMUtilities.getKey([CLjava/lang/String;I[BZ)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
1.46 |
|
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.<init>(Ljava/lang/String;Lorg/bouncycastle/asn1/x509/X509Name;Ljava/security/PublicKey;Lorg/bouncycastle/asn1/ASN1Set;Ljava/security/PrivateKey;Ljava/lang/String;)V |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.PKCS10CertificationRequest.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r29.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Mac |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
virtualinvoke r9.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r8, r6) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
r8 = virtualinvoke r5.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r7) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.PKCS12Util.convertToDefiniteLength([B[CLjava/lang/String;)[B |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
KeyStore |
org.bouncycastle.jce.examples.PKCS12Example.main([Ljava/lang/String;)V |
virtualinvoke r16.<java.security.KeyStore: void store(java.io.OutputStream,char[])>(r17, $r65) |
Unexpected call to method store on object of type java.security.KeyStore. Expect a call to one of the following methods getKey,getEntry |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey)>(r1) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.sign(Ljava/security/PrivateKey;Ljava/security/SecureRandom;)V |
virtualinvoke r3.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r1, r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.jce.netscape.NetscapeCertRequest.verify(Ljava/lang/String;)Z |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.BrokenJCEBlockCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r50.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r41, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r16.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r15) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEBlockCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke $r16.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r15) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEBlockCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r92.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r93, $i16) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r12.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEElGamalCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10599, $r4) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEIESCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r6 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(r1, $r5) |
First parameter (with value "IES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCEKeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r1.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCERSACipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer10732, $r4) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JCESecretKeyFactory$DES.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer10836) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r8.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared D H |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JCEStreamCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r8.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r6) |
First parameter was not properly generated as prepared I V |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JCEStreamCipher.engineInit(ILjava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;Ljava/security/SecureRandom;)V |
specialinvoke $r29.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r30, $i3) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11059, $r6) |
First parameter (with value "DES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DES.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DH.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11063, $r8) |
First parameter (with value "DH") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$DSA.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11069, $r8) |
First parameter (with value "DSA") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$ElGamal.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11073, $r8) |
First parameter (with value "ElGamal") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$GOST3410.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r3 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11077, $r8) |
First parameter (with value "GOST3410") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r17 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11081, $r7) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r17 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11082, $r3) |
First parameter (with value "RC2") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameterGenerator$RC2.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r8.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r16) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$IVAlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PBKDF2.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$PKCS12PBE.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r5, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.JDKAlgorithmParameters$RC2AlgorithmParameters.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r6 = staticinvoke <javax.crypto.Cipher: javax.crypto.Cipher getInstance(java.lang.String,java.lang.String)>(r1, $r10) |
First parameter (with value "PBEWithSHAAndTwofish-CBC") should be any of {AES, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256, RSA} |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r11 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r18) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r7.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r9.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r3, i1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r9 = virtualinvoke $r8.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r49) |
First parameter was not properly generated as specced Key |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r4 = staticinvoke <javax.crypto.SecretKeyFactory: javax.crypto.SecretKeyFactory getInstance(java.lang.String,java.lang.String)>(r1, $r8) |
First parameter (with value "PBEWithSHAAndTwofish-CBC") should be any of {PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA384AndAES_128, PBKDF2WithHmacSHA224, PBKDF2WithHmacSHA256, PBKDF2WithHmacSHA384, PBKDF2WithHmacSHA512, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.JDKKeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke r40.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r4, r3) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r3, r5) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineLoad(Ljava/io/InputStream;[C)V |
staticinvoke <org.bouncycastle.util.io.Streams: int readFully(java.io.InputStream,byte[])>(r6, r10) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$BouncyCastleStore.engineStore(Ljava/io/OutputStream;[C)V |
specialinvoke $r13.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r4, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r16.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r19, r8) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.<init>(Lorg/bouncycastle/jce/provider/JDKKeyStore;Ljava/lang/String;Ljava/security/Key;[C[Ljava/security/cert/Certificate;)V |
specialinvoke $r17.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r9) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r12.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r48, r50) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r26.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r59, r60) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r33.<javax.crypto.CipherOutputStream: void <init>(java.io.OutputStream,javax.crypto.Cipher)>(r63, r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.CipherInputStream: void <init>(java.io.InputStream,javax.crypto.Cipher)>(r53, r55) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r13.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r51) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r27.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r61) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherInputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r45.<java.io.DataInputStream: void <init>(java.io.InputStream)>(r56) |
Operation on object of type javax.crypto.CipherInputStream object not completed. Expected call to read |
- |
- |
|
CipherOutputStream |
org.bouncycastle.jce.provider.JDKKeyStore$StoreEntry.getObject([C)Ljava/lang/Object; |
specialinvoke $r34.<java.io.DataOutputStream: void <init>(java.io.OutputStream)>(r3) |
Operation on object of type javax.crypto.CipherOutputStream object not completed. Expected call to write |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r22 = virtualinvoke r10.<javax.crypto.Cipher: java.security.Key unwrap(byte[],java.lang.String,int)>(r2, varReplacer11439, varReplacer11440) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r9.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r8, r7) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Mac |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
virtualinvoke r8.<javax.crypto.Mac: void init(java.security.Key,java.security.spec.AlgorithmParameterSpec)>(r7, r5) |
Second parameter was not properly generated as prepared H M A C |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r13 = virtualinvoke r4.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
$r19 = virtualinvoke r29.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
r9 = virtualinvoke r30.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r6) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r12.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r14.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r2) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r15.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r3) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r1, i0) |
Second parameter (with value 1024)Variable iterationCountmust be at least 10000 |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r16.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r17, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Ljava/io/InputStream;[C)V |
specialinvoke $r17.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r18, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
r6 = virtualinvoke r8.<javax.crypto.Cipher: byte[] wrap(java.security.Key)>(r2) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
$r15 = virtualinvoke r23.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r5) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r9.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>(r4) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineStore(Ljava/security/KeyStore$LoadStoreParameter;)V |
specialinvoke $r11.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r12, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.JDKPSSSigner.engineGetParameters()Ljava/security/AlgorithmParameters; |
$r5 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer11537, $r4) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.WrapCipherSpi.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke r80.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r65, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CRLObject.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r3.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.jce.provider.X509CertificateObject.verify(Ljava/security/PublicKey;)V |
virtualinvoke r2.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.asymmetric.ec.KeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r6.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r20, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
virtualinvoke r2.<java.security.AlgorithmParameters: void init(java.security.spec.AlgorithmParameterSpec)>($r7) |
First parameter was not properly generated as prepared I V |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12780, $r6) |
First parameter (with value "CAST5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.CAST5$AlgParams.localEngineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r3.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r4) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12819, $r6) |
First parameter (with value "Camellia") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.symmetric.DESede$KeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r4.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r5, varReplacer12890) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r4, $r5) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.jce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r7.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r1, $r8) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12973, $r6) |
First parameter (with value "Noekeon") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer12986, $r6) |
First parameter (with value "RC5") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13018, $r6) |
First parameter (with value "RC6") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
AlgorithmParameters |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
r2 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String,java.lang.String)>(varReplacer13043, $r6) |
First parameter (with value "SEED") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.bouncycastle.jce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r7.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r1) |
First parameter was not properly generated as randomized |
- |
- |
|
Signature |
org.bouncycastle.mozilla.SignedPublicKeyAndChallenge.verify(Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r2) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPResp.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r15.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.BasicOCSPRespGenerator.generate(Ljava/lang/String;Ljava/security/PrivateKey;[Ljava/security/cert/X509Certificate;Ljava/util/Date;Ljava/lang/String;Ljava/security/SecureRandom;)Lorg/bouncycastle/ocsp/BasicOCSPResp; |
virtualinvoke r55.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r6) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
MessageDigest |
org.bouncycastle.ocsp.CertificateID.<init>(Ljava/lang/String;Ljava/security/cert/X509Certificate;Ljava/math/BigInteger;Ljava/lang/String;)V |
virtualinvoke r29.<java.security.MessageDigest: void update(byte[])>($r19) |
Unexpected call to method update on object of type java.security.MessageDigest. Expect a call to one of the following methods reset |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReq.verify(Ljava/security/PublicKey;Ljava/lang/String;)Z |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.ocsp.OCSPReqGenerator.generate()Lorg/bouncycastle/ocsp/OCSPReq; |
virtualinvoke r58.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r5) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
virtualinvoke r103.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>(varReplacer13603, r102, r3) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
virtualinvoke r103.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>(varReplacer13603, r102, r3) |
Third parameter was not properly generated as prepared Alg |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
virtualinvoke r109.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(varReplacer13601, $r53, r108) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
virtualinvoke r118.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(varReplacer13605, $r31, r117) |
Third parameter was not properly generated as prepared G C M |
- |
- |
|
PBEKeySpec |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
$r31 = virtualinvoke r116.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r115) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
$r53 = virtualinvoke r107.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r106) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
specialinvoke $r22.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>($r25) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEKeySpec |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
specialinvoke $r44.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>($r47) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
specialinvoke $r27.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r28, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.openssl.PEMReader$EncryptedPrivateKeyParser.parseObject(Lorg/bouncycastle/util/io/pem/PemObject;)Ljava/lang/Object; |
specialinvoke $r49.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>($r50, $i1) |
First parameter was not properly generated as randomized |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/security/Provider;[B[CLjava/lang/String;[B)[B |
virtualinvoke r28.<javax.crypto.Cipher: void init(int,java.security.Key)>(b0, r19) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/security/Provider;[B[CLjava/lang/String;[B)[B |
virtualinvoke r28.<javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>(b0, r19, r37) |
Second parameter was not properly generated as generated Key |
- |
- |
|
IvParameterSpec |
org.bouncycastle.openssl.PEMUtilities.crypt(ZLjava/security/Provider;[B[CLjava/lang/String;[B)[B |
specialinvoke r30.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>(r4) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.bouncycastle.openssl.PEMUtilities.generateSecretKeyForPKCS5Scheme2(Ljava/lang/String;[C[BI)Ljavax/crypto/SecretKey; |
specialinvoke $r6.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r9, r0) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
SecretKeySpec |
org.bouncycastle.openssl.PEMUtilities.getKey([CLjava/lang/String;I[BZ)Ljavax/crypto/SecretKey; |
specialinvoke $r9.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r5, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PKCS8Generator.<init>(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/lang/String;)V |
specialinvoke r0.<org.bouncycastle.openssl.PKCS8Generator: void init(java.security.PrivateKey,java.lang.String,java.security.Provider)>(r1, r2, r4) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.openssl.PKCS8Generator.<init>(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/lang/String;)V |
specialinvoke r0.<org.bouncycastle.openssl.PKCS8Generator: void init(java.security.PrivateKey,java.lang.String,java.security.Provider)>(r1, r2, r4) |
Operation on object of type javax.crypto.SecretKeyFactory object not completed. Expected call to translateKey, generateSecret |
- |
- |
|
Cipher |
org.bouncycastle.openssl.PKCS8Generator.<init>(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/Provider;)V |
specialinvoke r0.<org.bouncycastle.openssl.PKCS8Generator: void init(java.security.PrivateKey,java.lang.String,java.security.Provider)>(r1, r2, r3) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.AlgorithmParameters,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.SecureRandom)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec)>, <javax.crypto.Cipher: void init(int,java.security.cert.Certificate)>, <javax.crypto.Cipher: void init(int,java.security.Key,java.security.spec.AlgorithmParameterSpec,java.security.SecureRandom)> |
- |
- |
|
SecretKeyFactory |
org.bouncycastle.openssl.PKCS8Generator.<init>(Ljava/security/PrivateKey;Ljava/lang/String;Ljava/security/Provider;)V |
specialinvoke r0.<org.bouncycastle.openssl.PKCS8Generator: void init(java.security.PrivateKey,java.lang.String,java.security.Provider)>(r1, r2, r3) |
Operation on object of type javax.crypto.SecretKeyFactory object not completed. Expected call to translateKey, generateSecret |
- |
- |
|
PBEKeySpec |
org.bouncycastle.openssl.PKCS8Generator.generate()Lorg/bouncycastle/util/io/pem/PemObject; |
$r22 = virtualinvoke $r20.<javax.crypto.SecretKeyFactory: javax.crypto.SecretKey generateSecret(java.security.spec.KeySpec)>(r81) |
Operation on object of type javax.crypto.spec.PBEKeySpec object not completed. Expected call to clearPassword |
- |
- |
|
PBEKeySpec |
org.bouncycastle.openssl.PKCS8Generator.generate()Lorg/bouncycastle/util/io/pem/PemObject; |
specialinvoke r103.<javax.crypto.spec.PBEKeySpec: void <init>(char[])>($r18) |
Detected call to forbidden method void <init>(char[]) of class javax.crypto.spec.PBEKeySpec. Instead, call method <javax.crypto.spec.PBEKeySpec: void <init>(char[],byte[],int,int)>. |
- |
- |
|
PBEParameterSpec |
org.bouncycastle.openssl.PKCS8Generator.generate()Lorg/bouncycastle/util/io/pem/PemObject; |
specialinvoke r104.<javax.crypto.spec.PBEParameterSpec: void <init>(byte[],int)>(r80, $i0) |
First parameter was not properly generated as randomized |
- |
- |
|
MessageDigest |
org.bouncycastle.x509.AttributeCertificateHolder.match(Ljava/security/cert/Certificate;)Z |
$r28 = virtualinvoke r27.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey)>(r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r6.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r3, r4) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey)>(r2) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.calculateSignature(Lorg/bouncycastle/asn1/DERObjectIdentifier;Ljava/lang/String;Ljava/security/PrivateKey;Ljava/security/SecureRandom;Lorg/bouncycastle/asn1/ASN1Encodable;)[B |
virtualinvoke r5.<java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>(r2, r3) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.getSignatureInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/Signature; |
$r2 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r0) |
First parameter (with value "SHA1WithRSAEncryption") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.bouncycastle.x509.X509Util.getSignatureInstance(Ljava/lang/String;Ljava/lang/String;)Ljava/security/Signature; |
$r3 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.lang.String)>(r0, r1) |
First parameter (with value "SHA1WithRSAEncryption") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.bouncycastle.x509.X509V2AttributeCertificate.verify(Ljava/security/PublicKey;Ljava/lang/String;)V |
virtualinvoke r20.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |