Version |
Insecure |
CryptoMisuse |
Rule name |
Method |
Statement |
Details |
1.0.0 |
|
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
$r13 = virtualinvoke r45.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r44) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r44, r4) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, update, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)> |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1606, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1606, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1615, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2210) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "ARCFOUR") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2162) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer123) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1895) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1529, varReplacer1529) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
1.0.1 |
|
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
$r13 = virtualinvoke r45.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r44) |
First parameter (with value "NONEwithRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r44, r4) |
First parameter (with value "NONEwithRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>, update |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1608, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1613, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1613, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2211) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyStore |
org.conscrypt.KeyManagerFactoryImpl.engineInit(Ljava/security/KeyStore;[C)V |
virtualinvoke $r9.<java.security.KeyStore: void load(java.io.InputStream,char[])>($r7, $r10) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "ChaCha20") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2162) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer122) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1891) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1530, varReplacer1530) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
1.0.2 |
|
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
$r13 = virtualinvoke r45.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r44) |
First parameter (with value "NONEwithRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r44, r4) |
First parameter (with value "NONEwithRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, update, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)> |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1603, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1603, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1604, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2211) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyStore |
org.conscrypt.KeyManagerFactoryImpl.engineInit(Ljava/security/KeyStore;[C)V |
virtualinvoke $r9.<java.security.KeyStore: void load(java.io.InputStream,char[])>($r7, $r10) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "AES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2165) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer124) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1895) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1530, varReplacer1530) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
1.1.0 |
|
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
$r13 = virtualinvoke r45.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r44) |
First parameter (with value "NONEwithRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r44, r4) |
First parameter (with value "NONEwithRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, update, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)> |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1635, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1652, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1652, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2253) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyStore |
org.conscrypt.KeyManagerFactoryImpl.engineInit(Ljava/security/KeyStore;[C)V |
virtualinvoke $r9.<java.security.KeyStore: void load(java.io.InputStream,char[])>($r7, $r10) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "AES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2199) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer124) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1933) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1559, varReplacer1559) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
1.1.1 |
|
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
$r13 = virtualinvoke r45.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r44) |
First parameter (with value "NONEwithRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r44, r4) |
First parameter (with value "NONEwithRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>, update |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1640, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1644, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1644, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2255) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyStore |
org.conscrypt.KeyManagerFactoryImpl.engineInit(Ljava/security/KeyStore;[C)V |
virtualinvoke $r9.<java.security.KeyStore: void load(java.io.InputStream,char[])>($r7, $r10) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "DESede") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2202) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer123) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1934) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1562, varReplacer1562) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
1.1.2 |
|
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
$r13 = virtualinvoke r45.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r44) |
First parameter (with value "NONEwithRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r44, r4) |
First parameter (with value "NONEwithRSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, update, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)> |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1639, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1649, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1649, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2256) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "AES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2202) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer126) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1933) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1564, varReplacer1564) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
1.1.3 |
|
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
$r13 = virtualinvoke r45.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r44) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r44, r4) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, update, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)> |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1646, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1646, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1654, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2265) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "AES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2208) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer129) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer1941) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1568, varReplacer1568) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
1.1.4 |
|
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
$r13 = virtualinvoke r45.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r44) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
r45 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r44, r4) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.rawSignDigestWithPrivateKey(Ljava/security/PrivateKey;[B)[B |
virtualinvoke r45.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, update, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)> |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1743, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1752, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaDecryptWithPrivateKey(Ljava/security/PrivateKey;I[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(varReplacer1752, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2465) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "DESede") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2409) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer128) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2044) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
TrustManagerFactory |
org.conscrypt.Platform.getDefaultCertKeyStore()Ljava/security/KeyStore; |
virtualinvoke r20.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r10) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1667, varReplacer1667) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustManagerImpl.<init>(Ljava/security/KeyStore;Lorg/conscrypt/CertPinManager;Lorg/conscrypt/ConscryptCertStore;Lorg/conscrypt/CertBlacklist;Lorg/conscrypt/ct/CTLogStore;Lorg/conscrypt/ct/CTVerifier;Lorg/conscrypt/ct/CTPolicy;)V |
specialinvoke $r5.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r3, varReplacer2229) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustManagerImpl.checkClientTrusted([Ljava/security/cert/X509Certificate;Ljava/lang/String;Ljava/lang/String;)Ljava/util/List; |
specialinvoke $r7.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r3, varReplacer2276) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustedCertificateIndex.index(Ljava/security/cert/X509Certificate;)Ljava/security/cert/TrustAnchor; |
specialinvoke $r3.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r1, varReplacer876) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
Signature |
org.conscrypt.ct.CTLogInfo.verifySingleSCT(Lorg/conscrypt/ct/SignedCertificateTimestamp;Lorg/conscrypt/ct/CertificateEntry;)Lorg/conscrypt/ct/VerifiedSCT$Status; |
virtualinvoke r23.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
1.2.0 |
|
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(i1, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(i1, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
$r5 = virtualinvoke r36.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
r36 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r2) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
r36 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r2, r4) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
virtualinvoke r36.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
virtualinvoke r36.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)>, update |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2478) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyStore |
org.conscrypt.KeyManagerFactoryImpl.engineInit(Ljava/security/KeyStore;[C)V |
virtualinvoke $r9.<java.security.KeyStore: void load(java.io.InputStream,char[])>($r7, $r10) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "AES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2420) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer127) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2059) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
TrustManagerFactory |
org.conscrypt.Platform.getDefaultCertKeyStore()Ljava/security/KeyStore; |
virtualinvoke r20.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r10) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1676, varReplacer1676) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustManagerImpl.<init>(Ljava/security/KeyStore;Lorg/conscrypt/CertPinManager;Lorg/conscrypt/ConscryptCertStore;Lorg/conscrypt/CertBlacklist;Lorg/conscrypt/ct/CTLogStore;Lorg/conscrypt/ct/CTVerifier;Lorg/conscrypt/ct/CTPolicy;)V |
specialinvoke $r5.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r3, varReplacer2240) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustManagerImpl.checkClientTrusted([Ljava/security/cert/X509Certificate;Ljava/lang/String;Ljava/lang/String;)Ljava/util/List; |
specialinvoke $r7.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r3, varReplacer2286) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustedCertificateIndex.index(Ljava/security/cert/X509Certificate;)Ljava/security/cert/TrustAnchor; |
specialinvoke $r3.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r1, varReplacer882) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
Signature |
org.conscrypt.ct.CTLogInfo.verifySingleSCT(Lorg/conscrypt/ct/SignedCertificateTimestamp;Lorg/conscrypt/ct/CertificateEntry;)Lorg/conscrypt/ct/VerifiedSCT$Status; |
virtualinvoke r23.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
1.3.0 |
|
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(i1, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(i1, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
$r5 = virtualinvoke r36.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
r36 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r2) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
r36 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r2, r4) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
virtualinvoke r36.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
virtualinvoke r36.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, update, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)> |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2484) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyStore |
org.conscrypt.KeyManagerFactoryImpl.engineInit(Ljava/security/KeyStore;[C)V |
virtualinvoke $r9.<java.security.KeyStore: void load(java.io.InputStream,char[])>($r7, $r10) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "AES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2425) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer132) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2062) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
TrustManagerFactory |
org.conscrypt.Platform.getDefaultCertKeyStore()Ljava/security/KeyStore; |
virtualinvoke r20.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r10) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1683, varReplacer1683) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustManagerImpl.<init>(Ljava/security/KeyStore;Lorg/conscrypt/CertPinManager;Lorg/conscrypt/ConscryptCertStore;Lorg/conscrypt/CertBlacklist;Lorg/conscrypt/ct/CTLogStore;Lorg/conscrypt/ct/CTVerifier;Lorg/conscrypt/ct/CTPolicy;)V |
specialinvoke $r5.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r3, varReplacer2245) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustManagerImpl.checkClientTrusted([Ljava/security/cert/X509Certificate;Ljava/lang/String;Ljava/lang/String;)Ljava/util/List; |
specialinvoke $r7.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r3, varReplacer2291) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustedCertificateIndex.index(Ljava/security/cert/X509Certificate;)Ljava/security/cert/TrustAnchor; |
specialinvoke $r3.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r1, varReplacer887) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
Signature |
org.conscrypt.ct.CTLogInfo.verifySingleSCT(Lorg/conscrypt/ct/SignedCertificateTimestamp;Lorg/conscrypt/ct/CertificateEntry;)Lorg/conscrypt/ct/VerifiedSCT$Status; |
virtualinvoke r23.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
1.4.0 |
|
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(i1, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(i1, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
$r5 = virtualinvoke r36.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
r36 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r2) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
r36 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r2, r4) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
virtualinvoke r36.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
virtualinvoke r36.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, update, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)> |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2492) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyStore |
org.conscrypt.KeyManagerFactoryImpl.engineInit(Ljava/security/KeyStore;[C)V |
virtualinvoke $r9.<java.security.KeyStore: void load(java.io.InputStream,char[])>($r7, $r10) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "AES") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2433) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer130) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2068) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
TrustManagerFactory |
org.conscrypt.Platform.getDefaultCertKeyStore()Ljava/security/KeyStore; |
virtualinvoke r20.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r10) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1690, varReplacer1690) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustManagerImpl.<init>(Ljava/security/KeyStore;Lorg/conscrypt/CertPinManager;Lorg/conscrypt/ConscryptCertStore;Lorg/conscrypt/CertBlacklist;Lorg/conscrypt/ct/CTLogStore;Lorg/conscrypt/ct/CTVerifier;Lorg/conscrypt/ct/CTPolicy;)V |
specialinvoke $r5.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r3, varReplacer2252) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustManagerImpl.checkClientTrusted([Ljava/security/cert/X509Certificate;Ljava/lang/String;Ljava/lang/String;)Ljava/util/List; |
specialinvoke $r7.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r3, varReplacer2297) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustedCertificateIndex.index(Ljava/security/cert/X509Certificate;)Ljava/security/cert/TrustAnchor; |
specialinvoke $r3.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r1, varReplacer896) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
Signature |
org.conscrypt.ct.CTLogInfo.verifySingleSCT(Lorg/conscrypt/ct/SignedCertificateTimestamp;Lorg/conscrypt/ct/CertificateEntry;)Lorg/conscrypt/ct/VerifiedSCT$Status; |
virtualinvoke r23.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
1.4.1 |
|
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(i1, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(i1, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
$r5 = virtualinvoke r36.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
r36 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r2) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
r36 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r2, r4) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
virtualinvoke r36.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
virtualinvoke r36.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, update, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)> |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2493) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "ARCFOUR") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2434) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer130) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2070) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
TrustManagerFactory |
org.conscrypt.Platform.getDefaultCertKeyStore()Ljava/security/KeyStore; |
virtualinvoke r20.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r10) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1692, varReplacer1692) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustManagerImpl.<init>(Ljava/security/KeyStore;Lorg/conscrypt/CertPinManager;Lorg/conscrypt/ConscryptCertStore;Lorg/conscrypt/CertBlacklist;Lorg/conscrypt/ct/CTLogStore;Lorg/conscrypt/ct/CTVerifier;Lorg/conscrypt/ct/CTPolicy;)V |
specialinvoke $r5.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r3, varReplacer2254) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustManagerImpl.checkClientTrusted([Ljava/security/cert/X509Certificate;Ljava/lang/String;Ljava/lang/String;)Ljava/util/List; |
specialinvoke $r7.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r3, varReplacer2300) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustedCertificateIndex.index(Ljava/security/cert/X509Certificate;)Ljava/security/cert/TrustAnchor; |
specialinvoke $r3.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r1, varReplacer897) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
Signature |
org.conscrypt.ct.CTLogInfo.verifySingleSCT(Lorg/conscrypt/ct/SignedCertificateTimestamp;Lorg/conscrypt/ct/CertificateEntry;)Lorg/conscrypt/ct/VerifiedSCT$Status; |
virtualinvoke r23.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |
1.4.2 |
|
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
$r62 = virtualinvoke r61.<javax.crypto.Cipher: java.security.Provider getProvider()>() |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(i1, r0) |
Operation on object of type javax.crypto.Cipher object not completed. Expected call to update, doFinal |
- |
- |
|
Cipher |
org.conscrypt.CryptoUpcalls.rsaOpWithPrivateKey(Ljava/security/PrivateKey;II[B)[B |
virtualinvoke r61.<javax.crypto.Cipher: void init(int,java.security.Key)>(i1, r0) |
Second parameter was not properly generated as generated Key |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
$r5 = virtualinvoke r36.<java.security.Signature: java.security.Provider getProvider()>() |
Operation on object of type java.security.Signature object not completed. Expected call to initSign, update |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
r36 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String)>(r2) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
r36 = staticinvoke <java.security.Signature: java.security.Signature getInstance(java.lang.String,java.security.Provider)>(r2, r4) |
First parameter (with value "NONEwithECDSA") should be any of {NONEwithDSA, SHA1withDSA, SHA224withDSA, SHA256withDSA, SHA256withRSA, SHA256withECDSA} |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
virtualinvoke r36.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
First parameter was not properly generated as generated Privkey |
- |
- |
|
Signature |
org.conscrypt.CryptoUpcalls.signDigestWithPrivateKey(Ljava/security/PrivateKey;[BLjava/lang/String;)[B |
virtualinvoke r36.<java.security.Signature: void initSign(java.security.PrivateKey)>(r0) |
Operation on object of type java.security.Signature object not completed. Expected call to <java.security.Signature: void initSign(java.security.PrivateKey)>, update, <java.security.Signature: void initSign(java.security.PrivateKey,java.security.SecureRandom)> |
- |
- |
|
SecretKeySpec |
org.conscrypt.DESEDESecretKeyFactory.engineGenerateSecret(Ljava/security/spec/KeySpec;)Ljavax/crypto/SecretKey; |
specialinvoke $r10.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r11, varReplacer2500) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
KeyManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r5.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(r4, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getKeyManagers()[Ljavax/net/ssl/KeyManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
KeyStore |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r4.<java.security.KeyStore: void load(java.io.InputStream,char[])>(r15, r3) |
Second parameter should never be of type java.lang.String. |
- |
- |
|
TrustManagerFactory |
org.conscrypt.DefaultSSLContextImpl.getTrustManagers()[Ljavax/net/ssl/TrustManager; |
virtualinvoke r5.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>(r4) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
IvParameterSpec |
org.conscrypt.IvParameters.engineGetParameterSpec(Ljava/lang/Class;)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r2.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r3) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.KeyGeneratorImpl.engineGenerateKey()Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, $r4) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
MessageDigest |
org.conscrypt.NativeCrypto.X509_NAME_hash_old(Ljavax/security/auth/x500/X500Principal;)I |
$r2 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(r1) |
First parameter (with value "SHA1") should be any of {SHA-256, SHA-384, SHA-512} |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
r8 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>($r3) |
First parameter (with value "ARCFOUR") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
IvParameterSpec |
org.conscrypt.OpenSSLCipher.engineGetParameters()Ljava/security/AlgorithmParameters; |
specialinvoke $r4.<javax.crypto.spec.IvParameterSpec: void <init>(byte[])>($r5) |
First parameter was not properly generated as randomized |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipher.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipher$EVP_AEAD$AES$GCM.engineGetParameters()Ljava/security/AlgorithmParameters; |
r10 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2439) |
First parameter (with value "GCM") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLCipherRSA.engineUnwrap([BLjava/lang/String;I)Ljava/security/Key; |
specialinvoke $r8.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>(r19, r2) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLCipherRSA$OAEP.engineGetParameters()Ljava/security/AlgorithmParameters; |
r15 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer131) |
First parameter (with value "OAEP") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
SecretKeySpec |
org.conscrypt.OpenSSLECDHKeyAgreement.engineGenerateSecret(Ljava/lang/String;)Ljavax/crypto/SecretKey; |
specialinvoke $r2.<javax.crypto.spec.SecretKeySpec: void <init>(byte[],java.lang.String)>($r3, r1) |
First parameter was not properly generated as prepared Key Material |
- |
- |
|
AlgorithmParameters |
org.conscrypt.OpenSSLSignature$RSAPSSPadding.engineGetParameters()Ljava/security/AlgorithmParameters; |
r9 = staticinvoke <java.security.AlgorithmParameters: java.security.AlgorithmParameters getInstance(java.lang.String)>(varReplacer2074) |
First parameter (with value "PSS") should be any of {AES, Blowfish, DESede, DiffieHellman, OEAP, PBEWithHmacSHA224AndAES_128, PBEWithHmacSHA256AndAES_128, PBEWithHmacSHA384AndAES_128, PBEWithHmacSHA512AndAES_128, PBEWithHmacSHA224AndAES_256, PBEWithHmacSHA256AndAES_256, PBEWithHmacSHA384AndAES_256, PBEWithHmacSHA512AndAES_256} |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509CRL.verify(Ljava/security/PublicKey;)V |
virtualinvoke r7.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;)V |
virtualinvoke r8.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
Signature |
org.conscrypt.OpenSSLX509Certificate.verify(Ljava/security/PublicKey;Ljava/security/Provider;)V |
virtualinvoke r10.<java.security.Signature: void initVerify(java.security.PublicKey)>(r1) |
First parameter was not properly generated as generated Pubkey |
- |
- |
|
TrustManagerFactory |
org.conscrypt.Platform.getDefaultCertKeyStore()Ljava/security/KeyStore; |
virtualinvoke r20.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r10) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
GCMParameterSpec |
org.conscrypt.Platform.toGCMParameterSpec(I[B)Ljava/security/spec/AlgorithmParameterSpec; |
specialinvoke $r1.<javax.crypto.spec.GCMParameterSpec: void <init>(int,byte[])>(i0, r0) |
Second parameter was not properly generated as randomized |
- |
- |
|
KeyManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509KeyManager()Ljavax/net/ssl/X509KeyManager; |
virtualinvoke r0.<javax.net.ssl.KeyManagerFactory: void init(java.security.KeyStore,char[])>(varReplacer1696, varReplacer1696) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustManagerFactory |
org.conscrypt.SSLParametersImpl.createDefaultX509TrustManager()Ljavax/net/ssl/X509TrustManager; |
virtualinvoke r0.<javax.net.ssl.TrustManagerFactory: void init(java.security.KeyStore)>($r3) |
First parameter was not properly generated as generated Key Store |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustManagerImpl.<init>(Ljava/security/KeyStore;Lorg/conscrypt/CertPinManager;Lorg/conscrypt/ConscryptCertStore;Lorg/conscrypt/CertBlacklist;Lorg/conscrypt/ct/CTLogStore;Lorg/conscrypt/ct/CTVerifier;Lorg/conscrypt/ct/CTPolicy;)V |
specialinvoke $r5.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r3, varReplacer2257) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustManagerImpl.checkClientTrusted([Ljava/security/cert/X509Certificate;Ljava/lang/String;Ljava/lang/String;)Ljava/util/List; |
specialinvoke $r7.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r3, varReplacer2304) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
TrustAnchor |
org.conscrypt.TrustedCertificateIndex.index(Ljava/security/cert/X509Certificate;)Ljava/security/cert/TrustAnchor; |
specialinvoke $r3.<java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])>(r1, varReplacer897) |
Unexpected call to method <java.security.cert.TrustAnchor: void <init>(java.security.cert.X509Certificate,byte[])> on object of type java.security.cert.TrustAnchor. Expect a call to one of the following methods <java.security.cert.TrustAnchor: void <init>(javax.security.auth.x500.X500Principal,java.security.PublicKey,byte[])>,<java.security.cert.TrustAnchor: void <init>(java.lang.String,java.security.PublicKey,byte[])> |
- |
- |
|
Signature |
org.conscrypt.ct.CTLogInfo.verifySingleSCT(Lorg/conscrypt/ct/SignedCertificateTimestamp;Lorg/conscrypt/ct/CertificateEntry;)Lorg/conscrypt/ct/VerifiedSCT$Status; |
virtualinvoke r23.<java.security.Signature: void initVerify(java.security.PublicKey)>($r7) |
First parameter was not properly generated as generated Pubkey |