Column
Insecure: Icon
indicates the version is insecure, otherwise
Column
CryptoMisuse: Icon
indicates the version has cryptographic API misuse, otherwise
Version |
Insecure |
CryptoMisuse |
Rule name |
Method |
Statement |
Details |
2.0 |
|
|
|
|
|
|
2.1 |
|
|
|
|
|
|
2.1.1 |
|
|
|
|
|
|
2.2 |
|
|
|
|
|
|
2.3 |
|
|
MessageDigest |
org.robolectric.util.SQLiteLibraryLoader.load()V |
$r10 = virtualinvoke r20.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
org.robolectric.util.SQLiteLibraryLoader.load()V |
r20 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer3784) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
2.4 |
|
|
MessageDigest |
org.robolectric.util.SQLiteLibraryLoader.load()V |
$r10 = virtualinvoke r20.<java.security.MessageDigest: byte[] digest()>() |
Unexpected call to method <java.security.MessageDigest: byte[] digest()> on object of type java.security.MessageDigest. Expect a call to one of the following methods <java.security.MessageDigest: void update(byte[])>,<java.security.MessageDigest: void update(byte[],int,int)>,<java.security.MessageDigest: byte[] digest(byte[])>,<java.security.MessageDigest: void update(java.nio.ByteBuffer)>,<java.security.MessageDigest: void update(byte)> |
- |
- |
|
MessageDigest |
org.robolectric.util.SQLiteLibraryLoader.load()V |
r20 = staticinvoke <java.security.MessageDigest: java.security.MessageDigest getInstance(java.lang.String)>(varReplacer3927) |
First parameter (with value "MD5") should be any of {SHA-256, SHA-384, SHA-512} |
3.0 |
|
|
|
|
|
|
3.1 |
|
|
|
|
|
|
3.1.1 |
|
|
|
|
|
|
3.1.2 |
|
|
|
|
|
|
3.1.3 |
|
|
|
|
|
|
3.1.4 |
|
|
|
|
|
|
3.2 |
|
|
|
|
|
|
3.2.1 |
|
|
|
|
|
|
3.2.2 |
|
|
|
|
|
|
3.3 |
|
|
|
|
|
|
3.3.1 |
|
|
|
|
|
|
3.3.2 |
|
|
|
|
|
|
3.4 |
|
|
|
|
|
|
3.4.1 |
|
|
|
|
|
|
3.4.2 |
|
|
|
|
|
|
3.5 |
|
|
|
|
|
|
3.5.1 |
|
|
|
|
|
|
3.6 |
|
|
|
|
|
|
3.6.1 |
|
|
|
|
|
|
3.6.2 |
|
|
|
|
|
|
3.7 |
|
|
|
|
|
|
3.7.1 |
|
|
|
|
|
|
3.8 |
|
|
|
|
|
|
4.0 |
|
|
|
|
|
|
4.0.1 |
|
|
|
|
|
|
4.0.2 |
|
|
|
|
|
|
4.1 |
|
|
|
|
|
|