public final class com.sun.crypto.provider.HmacPKCS12PBESHA1 extends com.sun.crypto.provider.HmacCore
  minor version: 0
  major version: 59
  flags: flags: (0x0031) ACC_PUBLIC, ACC_FINAL, ACC_SUPER
  this_class: com.sun.crypto.provider.HmacPKCS12PBESHA1
  super_class: com.sun.crypto.provider.HmacCore
{
  public void <init>();
    descriptor: ()V
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=3, locals=1, args_size=1
        start local 0 // com.sun.crypto.provider.HmacPKCS12PBESHA1 this
         0: .line 50
            aload 0 /* this */
            ldc "SHA1"
            bipush 64
            invokespecial com.sun.crypto.provider.HmacCore.<init>:(Ljava/lang/String;I)V
         1: .line 51
            return
        end local 0 // com.sun.crypto.provider.HmacPKCS12PBESHA1 this
      LocalVariableTable:
        Start  End  Slot  Name  Signature
            0    2     0  this  Lcom/sun/crypto/provider/HmacPKCS12PBESHA1;
    Exceptions:
      throws java.security.NoSuchAlgorithmException

  protected void engineInit(java.security.Key, java.security.spec.AlgorithmParameterSpec);
    descriptor: (Ljava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;)V
    flags: (0x0004) ACC_PROTECTED
    Code:
      stack=6, locals=9, args_size=3
        start local 0 // com.sun.crypto.provider.HmacPKCS12PBESHA1 this
        start local 1 // java.security.Key key
        start local 2 // java.security.spec.AlgorithmParameterSpec params
         0: .line 67
            aconst_null
            astore 4 /* salt */
        start local 4 // byte[] salt
         1: .line 68
            iconst_0
            istore 5 /* iCount */
        start local 5 // int iCount
         2: .line 69
            aload 1 /* key */
            instanceof javax.crypto.interfaces.PBEKey
            ifeq 9
         3: .line 71
            aload 1 /* key */
            checkcast javax.crypto.interfaces.PBEKey
         4: .line 70
            astore 6 /* pbeKey */
        start local 6 // javax.crypto.interfaces.PBEKey pbeKey
         5: .line 72
            aload 6 /* pbeKey */
            invokeinterface javax.crypto.interfaces.PBEKey.getPassword:()[C
            astore 3 /* passwdChars */
        start local 3 // char[] passwdChars
         6: .line 73
            aload 6 /* pbeKey */
            invokeinterface javax.crypto.interfaces.PBEKey.getSalt:()[B
            astore 4 /* salt */
         7: .line 74
            aload 6 /* pbeKey */
            invokeinterface javax.crypto.interfaces.PBEKey.getIterationCount:()I
            istore 5 /* iCount */
        end local 6 // javax.crypto.interfaces.PBEKey pbeKey
         8: .line 75
            goto 23
        end local 3 // char[] passwdChars
      StackMap locals: com.sun.crypto.provider.HmacPKCS12PBESHA1 java.security.Key java.security.spec.AlgorithmParameterSpec top byte[] int
      StackMap stack:
         9: aload 1 /* key */
            instanceof javax.crypto.SecretKey
            ifeq 22
        10: .line 77
            aload 1 /* key */
            invokeinterface java.security.Key.getAlgorithm:()Ljava/lang/String;
            iconst_1
            iconst_0
            ldc "PBE"
            iconst_0
            iconst_3
            invokevirtual java.lang.String.regionMatches:(ZILjava/lang/String;II)Z
            ifeq 13
        11: .line 78
            aload 1 /* key */
            invokeinterface java.security.Key.getEncoded:()[B
            dup
            astore 6 /* passwdBytes */
        start local 6 // byte[] passwdBytes
        12: ifnonnull 14
        end local 6 // byte[] passwdBytes
        13: .line 79
      StackMap locals:
      StackMap stack:
            new java.security.InvalidKeyException
            dup
            ldc "Missing password"
            invokespecial java.security.InvalidKeyException.<init>:(Ljava/lang/String;)V
            athrow
        start local 6 // byte[] passwdBytes
        14: .line 81
      StackMap locals: byte[]
      StackMap stack:
            aload 6 /* passwdBytes */
            arraylength
            newarray 5
            astore 3 /* passwdChars */
        start local 3 // char[] passwdChars
        15: .line 82
            iconst_0
            istore 7 /* i */
        start local 7 // int i
        16: goto 19
        17: .line 83
      StackMap locals: com.sun.crypto.provider.HmacPKCS12PBESHA1 java.security.Key java.security.spec.AlgorithmParameterSpec char[] byte[] int byte[] int
      StackMap stack:
            aload 3 /* passwdChars */
            iload 7 /* i */
            aload 6 /* passwdBytes */
            iload 7 /* i */
            baload
            bipush 127
            iand
            i2c
            castore
        18: .line 82
            iinc 7 /* i */ 1
      StackMap locals:
      StackMap stack:
        19: iload 7 /* i */
            aload 3 /* passwdChars */
            arraylength
            if_icmplt 17
        end local 7 // int i
        20: .line 85
            aload 6 /* passwdBytes */
            iconst_0
            invokestatic java.util.Arrays.fill:([BB)V
        end local 6 // byte[] passwdBytes
        21: .line 86
            goto 23
        end local 3 // char[] passwdChars
        22: .line 87
      StackMap locals: com.sun.crypto.provider.HmacPKCS12PBESHA1 java.security.Key java.security.spec.AlgorithmParameterSpec top byte[] int
      StackMap stack:
            new java.security.InvalidKeyException
            dup
            ldc "SecretKey of PBE type required"
            invokespecial java.security.InvalidKeyException.<init>:(Ljava/lang/String;)V
            athrow
        start local 3 // char[] passwdChars
        23: .line 92
      StackMap locals: com.sun.crypto.provider.HmacPKCS12PBESHA1 java.security.Key java.security.spec.AlgorithmParameterSpec char[] byte[] int
      StackMap stack:
            aload 2 /* params */
            ifnonnull 28
        24: .line 96
            aload 4 /* salt */
            ifnull 25
            iload 5 /* iCount */
            ifne 45
        25: .line 97
      StackMap locals:
      StackMap stack:
            new java.security.InvalidAlgorithmParameterException
            dup
        26: .line 98
            ldc "PBEParameterSpec required for salt and iteration count"
        27: .line 97
            invokespecial java.security.InvalidAlgorithmParameterException.<init>:(Ljava/lang/String;)V
            athrow
        28: .line 100
      StackMap locals:
      StackMap stack:
            aload 2 /* params */
            instanceof javax.crypto.spec.PBEParameterSpec
            ifne 32
        29: .line 101
            new java.security.InvalidAlgorithmParameterException
            dup
        30: .line 102
            ldc "PBEParameterSpec type required"
        31: .line 101
            invokespecial java.security.InvalidAlgorithmParameterException.<init>:(Ljava/lang/String;)V
            athrow
        32: .line 104
      StackMap locals:
      StackMap stack:
            aload 2 /* params */
            checkcast javax.crypto.spec.PBEParameterSpec
            astore 7 /* pbeParams */
        start local 7 // javax.crypto.spec.PBEParameterSpec pbeParams
        33: .line 106
            aload 4 /* salt */
            ifnull 38
        34: .line 107
            aload 4 /* salt */
            aload 7 /* pbeParams */
            invokevirtual javax.crypto.spec.PBEParameterSpec.getSalt:()[B
            invokestatic java.util.Arrays.equals:([B[B)Z
            ifne 39
        35: .line 108
            new java.security.InvalidAlgorithmParameterException
            dup
        36: .line 109
            ldc "Inconsistent value of salt between key and params"
        37: .line 108
            invokespecial java.security.InvalidAlgorithmParameterException.<init>:(Ljava/lang/String;)V
            athrow
        38: .line 112
      StackMap locals: com.sun.crypto.provider.HmacPKCS12PBESHA1 java.security.Key java.security.spec.AlgorithmParameterSpec char[] byte[] int top javax.crypto.spec.PBEParameterSpec
      StackMap stack:
            aload 7 /* pbeParams */
            invokevirtual javax.crypto.spec.PBEParameterSpec.getSalt:()[B
            astore 4 /* salt */
        39: .line 114
      StackMap locals:
      StackMap stack:
            iload 5 /* iCount */
            ifeq 44
        40: .line 115
            iload 5 /* iCount */
            aload 7 /* pbeParams */
            invokevirtual javax.crypto.spec.PBEParameterSpec.getIterationCount:()I
            if_icmpeq 45
        41: .line 116
            new java.security.InvalidAlgorithmParameterException
            dup
        42: .line 117
            ldc "Different iteration count between key and params"
        43: .line 116
            invokespecial java.security.InvalidAlgorithmParameterException.<init>:(Ljava/lang/String;)V
            athrow
        44: .line 120
      StackMap locals:
      StackMap stack:
            aload 7 /* pbeParams */
            invokevirtual javax.crypto.spec.PBEParameterSpec.getIterationCount:()I
            istore 5 /* iCount */
        end local 7 // javax.crypto.spec.PBEParameterSpec pbeParams
        45: .line 126
      StackMap locals: com.sun.crypto.provider.HmacPKCS12PBESHA1 java.security.Key java.security.spec.AlgorithmParameterSpec char[] byte[] int
      StackMap stack:
            aload 4 /* salt */
            arraylength
            bipush 8
            if_icmpge 49
        46: .line 127
            new java.security.InvalidAlgorithmParameterException
            dup
        47: .line 128
            ldc "Salt must be at least 8 bytes long"
        48: .line 127
            invokespecial java.security.InvalidAlgorithmParameterException.<init>:(Ljava/lang/String;)V
            athrow
        49: .line 130
      StackMap locals:
      StackMap stack:
            iload 5 /* iCount */
            ifgt 53
        50: .line 131
            new java.security.InvalidAlgorithmParameterException
            dup
        51: .line 132
            ldc "IterationCount must be a positive number"
        52: .line 131
            invokespecial java.security.InvalidAlgorithmParameterException.<init>:(Ljava/lang/String;)V
            athrow
        53: .line 134
      StackMap locals:
      StackMap stack:
            aload 3 /* passwdChars */
            aload 4 /* salt */
        54: .line 135
            iload 5 /* iCount */
            aload 0 /* this */
            invokevirtual com.sun.crypto.provider.HmacPKCS12PBESHA1.engineGetMacLength:()I
            iconst_3
        55: .line 134
            invokestatic com.sun.crypto.provider.PKCS12PBECipherCore.derive:([C[BIII)[B
            astore 6 /* derivedKey */
        start local 6 // byte[] derivedKey
        56: .line 136
            goto 60
        end local 6 // byte[] derivedKey
      StackMap locals:
      StackMap stack: java.lang.Throwable
        57: astore 8
        58: .line 137
            aload 3 /* passwdChars */
            iconst_0
            invokestatic java.util.Arrays.fill:([CC)V
        59: .line 138
            aload 8
            athrow
        start local 6 // byte[] derivedKey
        60: .line 137
      StackMap locals: byte[]
      StackMap stack:
            aload 3 /* passwdChars */
            iconst_0
            invokestatic java.util.Arrays.fill:([CC)V
        61: .line 139
            new javax.crypto.spec.SecretKeySpec
            dup
            aload 6 /* derivedKey */
            ldc "HmacSHA1"
            invokespecial javax.crypto.spec.SecretKeySpec.<init>:([BLjava/lang/String;)V
            astore 7 /* cipherKey */
        start local 7 // javax.crypto.SecretKey cipherKey
        62: .line 140
            aload 0 /* this */
            aload 7 /* cipherKey */
            aconst_null
            invokespecial com.sun.crypto.provider.HmacCore.engineInit:(Ljava/security/Key;Ljava/security/spec/AlgorithmParameterSpec;)V
        63: .line 141
            return
        end local 7 // javax.crypto.SecretKey cipherKey
        end local 6 // byte[] derivedKey
        end local 5 // int iCount
        end local 4 // byte[] salt
        end local 3 // char[] passwdChars
        end local 2 // java.security.spec.AlgorithmParameterSpec params
        end local 1 // java.security.Key key
        end local 0 // com.sun.crypto.provider.HmacPKCS12PBESHA1 this
      LocalVariableTable:
        Start  End  Slot         Name  Signature
            0   64     0         this  Lcom/sun/crypto/provider/HmacPKCS12PBESHA1;
            0   64     1          key  Ljava/security/Key;
            0   64     2       params  Ljava/security/spec/AlgorithmParameterSpec;
            6    9     3  passwdChars  [C
           15   22     3  passwdChars  [C
           23   64     3  passwdChars  [C
            1   64     4         salt  [B
            2   64     5       iCount  I
            5    8     6       pbeKey  Ljavax/crypto/interfaces/PBEKey;
           12   13     6  passwdBytes  [B
           14   21     6  passwdBytes  [B
           16   20     7            i  I
           56   57     6   derivedKey  [B
           60   64     6   derivedKey  [B
           33   45     7    pbeParams  Ljavax/crypto/spec/PBEParameterSpec;
           62   64     7    cipherKey  Ljavax/crypto/SecretKey;
      Exception table:
        from    to  target  type
          23    57      57  any
    Exceptions:
      throws java.security.InvalidKeyException, java.security.InvalidAlgorithmParameterException
    MethodParameters:
        Name  Flags
      key     
      params  

  public java.lang.Object clone();
    descriptor: ()Ljava/lang/Object;
    flags: (0x1041) ACC_PUBLIC, ACC_BRIDGE, ACC_SYNTHETIC
    Code:
      stack=1, locals=1, args_size=1
         0: .line 1
            aload 0
            invokespecial com.sun.crypto.provider.HmacCore.clone:()Ljava/lang/Object;
            areturn
      LocalVariableTable:
        Start  End  Slot  Name  Signature
    Exceptions:
      throws java.lang.CloneNotSupportedException
}
SourceFile: "HmacPKCS12PBESHA1.java"