public class sun.security.util.BitArray
  minor version: 0
  major version: 59
  flags: flags: (0x0021) ACC_PUBLIC, ACC_SUPER
  this_class: sun.security.util.BitArray
  super_class: java.lang.Object
{
  private byte[] repn;
    descriptor: [B
    flags: (0x0002) ACC_PRIVATE

  private int length;
    descriptor: I
    flags: (0x0002) ACC_PRIVATE

  private static final int BITS_PER_UNIT;
    descriptor: I
    flags: (0x001a) ACC_PRIVATE, ACC_STATIC, ACC_FINAL
    ConstantValue: 8

  private static final byte[][] NYBBLE;
    descriptor: [[B
    flags: (0x001a) ACC_PRIVATE, ACC_STATIC, ACC_FINAL

  private static final int BYTES_PER_LINE;
    descriptor: I
    flags: (0x001a) ACC_PRIVATE, ACC_STATIC, ACC_FINAL
    ConstantValue: 8

  static void <clinit>();
    descriptor: ()V
    flags: (0x0008) ACC_STATIC
    Code:
      stack=7, locals=0, args_size=0
         0: .line 219
            bipush 16
            anewarray byte[]
            dup
            iconst_0
         1: .line 220
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 48
            bastore
            dup
            iconst_1
            bipush 48
            bastore
            dup
            iconst_2
            bipush 48
            bastore
            dup
            iconst_3
            bipush 48
            bastore
            aastore
            dup
            iconst_1
         2: .line 221
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 48
            bastore
            dup
            iconst_1
            bipush 48
            bastore
            dup
            iconst_2
            bipush 48
            bastore
            dup
            iconst_3
            bipush 49
            bastore
            aastore
            dup
            iconst_2
         3: .line 222
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 48
            bastore
            dup
            iconst_1
            bipush 48
            bastore
            dup
            iconst_2
            bipush 49
            bastore
            dup
            iconst_3
            bipush 48
            bastore
            aastore
            dup
            iconst_3
         4: .line 223
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 48
            bastore
            dup
            iconst_1
            bipush 48
            bastore
            dup
            iconst_2
            bipush 49
            bastore
            dup
            iconst_3
            bipush 49
            bastore
            aastore
            dup
            iconst_4
         5: .line 224
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 48
            bastore
            dup
            iconst_1
            bipush 49
            bastore
            dup
            iconst_2
            bipush 48
            bastore
            dup
            iconst_3
            bipush 48
            bastore
            aastore
            dup
            iconst_5
         6: .line 225
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 48
            bastore
            dup
            iconst_1
            bipush 49
            bastore
            dup
            iconst_2
            bipush 48
            bastore
            dup
            iconst_3
            bipush 49
            bastore
            aastore
            dup
            bipush 6
         7: .line 226
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 48
            bastore
            dup
            iconst_1
            bipush 49
            bastore
            dup
            iconst_2
            bipush 49
            bastore
            dup
            iconst_3
            bipush 48
            bastore
            aastore
            dup
            bipush 7
         8: .line 227
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 48
            bastore
            dup
            iconst_1
            bipush 49
            bastore
            dup
            iconst_2
            bipush 49
            bastore
            dup
            iconst_3
            bipush 49
            bastore
            aastore
            dup
            bipush 8
         9: .line 228
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 49
            bastore
            dup
            iconst_1
            bipush 48
            bastore
            dup
            iconst_2
            bipush 48
            bastore
            dup
            iconst_3
            bipush 48
            bastore
            aastore
            dup
            bipush 9
        10: .line 229
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 49
            bastore
            dup
            iconst_1
            bipush 48
            bastore
            dup
            iconst_2
            bipush 48
            bastore
            dup
            iconst_3
            bipush 49
            bastore
            aastore
            dup
            bipush 10
        11: .line 230
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 49
            bastore
            dup
            iconst_1
            bipush 48
            bastore
            dup
            iconst_2
            bipush 49
            bastore
            dup
            iconst_3
            bipush 48
            bastore
            aastore
            dup
            bipush 11
        12: .line 231
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 49
            bastore
            dup
            iconst_1
            bipush 48
            bastore
            dup
            iconst_2
            bipush 49
            bastore
            dup
            iconst_3
            bipush 49
            bastore
            aastore
            dup
            bipush 12
        13: .line 232
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 49
            bastore
            dup
            iconst_1
            bipush 49
            bastore
            dup
            iconst_2
            bipush 48
            bastore
            dup
            iconst_3
            bipush 48
            bastore
            aastore
            dup
            bipush 13
        14: .line 233
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 49
            bastore
            dup
            iconst_1
            bipush 49
            bastore
            dup
            iconst_2
            bipush 48
            bastore
            dup
            iconst_3
            bipush 49
            bastore
            aastore
            dup
            bipush 14
        15: .line 234
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 49
            bastore
            dup
            iconst_1
            bipush 49
            bastore
            dup
            iconst_2
            bipush 49
            bastore
            dup
            iconst_3
            bipush 48
            bastore
            aastore
            dup
            bipush 15
        16: .line 235
            iconst_4
            newarray 8
            dup
            iconst_0
            bipush 49
            bastore
            dup
            iconst_1
            bipush 49
            bastore
            dup
            iconst_2
            bipush 49
            bastore
            dup
            iconst_3
            bipush 49
            bastore
            aastore
        17: .line 219
            putstatic sun.security.util.BitArray.NYBBLE:[[B
        18: .line 238
            return
      LocalVariableTable:
        Start  End  Slot  Name  Signature

  private static int subscript(int);
    descriptor: (I)I
    flags: (0x000a) ACC_PRIVATE, ACC_STATIC
    Code:
      stack=2, locals=1, args_size=1
        start local 0 // int idx
         0: .line 46
            iload 0 /* idx */
            bipush 8
            idiv
            ireturn
        end local 0 // int idx
      LocalVariableTable:
        Start  End  Slot  Name  Signature
            0    1     0   idx  I
    MethodParameters:
      Name  Flags
      idx   

  private static int position(int);
    descriptor: (I)I
    flags: (0x000a) ACC_PRIVATE, ACC_STATIC
    Code:
      stack=4, locals=1, args_size=1
        start local 0 // int idx
         0: .line 50
            iconst_1
            bipush 7
            iload 0 /* idx */
            bipush 8
            irem
            isub
            ishl
            ireturn
        end local 0 // int idx
      LocalVariableTable:
        Start  End  Slot  Name  Signature
            0    1     0   idx  I
    MethodParameters:
      Name  Flags
      idx   

  public void <init>(int);
    descriptor: (I)V
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=3, locals=2, args_size=2
        start local 0 // sun.security.util.BitArray this
        start local 1 // int length
         0: .line 56
            aload 0 /* this */
            invokespecial java.lang.Object.<init>:()V
         1: .line 57
            iload 1 /* length */
            ifge 3
         2: .line 58
            new java.lang.IllegalArgumentException
            dup
            ldc "Negative length for BitArray"
            invokespecial java.lang.IllegalArgumentException.<init>:(Ljava/lang/String;)V
            athrow
         3: .line 61
      StackMap locals: sun.security.util.BitArray int
      StackMap stack:
            aload 0 /* this */
            iload 1 /* length */
            putfield sun.security.util.BitArray.length:I
         4: .line 63
            aload 0 /* this */
            iload 1 /* length */
            bipush 8
            iadd
            iconst_1
            isub
            bipush 8
            idiv
            newarray 8
            putfield sun.security.util.BitArray.repn:[B
         5: .line 64
            return
        end local 1 // int length
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot    Name  Signature
            0    6     0    this  Lsun/security/util/BitArray;
            0    6     1  length  I
    Exceptions:
      throws java.lang.IllegalArgumentException
    MethodParameters:
        Name  Flags
      length  

  public void <init>(int, byte[]);
    descriptor: (I[B)V
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=5, locals=6, args_size=3
        start local 0 // sun.security.util.BitArray this
        start local 1 // int length
        start local 2 // byte[] a
         0: .line 74
            aload 0 /* this */
            invokespecial java.lang.Object.<init>:()V
         1: .line 76
            iload 1 /* length */
            ifge 3
         2: .line 77
            new java.lang.IllegalArgumentException
            dup
            ldc "Negative length for BitArray"
            invokespecial java.lang.IllegalArgumentException.<init>:(Ljava/lang/String;)V
            athrow
         3: .line 79
      StackMap locals: sun.security.util.BitArray int byte[]
      StackMap stack:
            aload 2 /* a */
            arraylength
            bipush 8
            imul
            iload 1 /* length */
            if_icmpge 5
         4: .line 80
            new java.lang.IllegalArgumentException
            dup
            ldc "Byte array too short to represent bit array of given length"
            invokespecial java.lang.IllegalArgumentException.<init>:(Ljava/lang/String;)V
            athrow
         5: .line 84
      StackMap locals:
      StackMap stack:
            aload 0 /* this */
            iload 1 /* length */
            putfield sun.security.util.BitArray.length:I
         6: .line 86
            iload 1 /* length */
            bipush 8
            iadd
            iconst_1
            isub
            bipush 8
            idiv
            istore 3 /* repLength */
        start local 3 // int repLength
         7: .line 87
            iload 3 /* repLength */
            bipush 8
            imul
            iload 1 /* length */
            isub
            istore 4 /* unusedBits */
        start local 4 // int unusedBits
         8: .line 88
            sipush 255
            iload 4 /* unusedBits */
            ishl
            i2b
            istore 5 /* bitMask */
        start local 5 // byte bitMask
         9: .line 95
            aload 0 /* this */
            iload 3 /* repLength */
            newarray 8
            putfield sun.security.util.BitArray.repn:[B
        10: .line 96
            aload 2 /* a */
            iconst_0
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            iconst_0
            iload 3 /* repLength */
            invokestatic java.lang.System.arraycopy:(Ljava/lang/Object;ILjava/lang/Object;II)V
        11: .line 97
            iload 3 /* repLength */
            ifle 13
        12: .line 98
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            iload 3 /* repLength */
            iconst_1
            isub
            dup2
            baload
            iload 5 /* bitMask */
            iand
            i2b
            bastore
        13: .line 100
      StackMap locals: int int int
      StackMap stack:
            return
        end local 5 // byte bitMask
        end local 4 // int unusedBits
        end local 3 // int repLength
        end local 2 // byte[] a
        end local 1 // int length
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot        Name  Signature
            0   14     0        this  Lsun/security/util/BitArray;
            0   14     1      length  I
            0   14     2           a  [B
            7   14     3   repLength  I
            8   14     4  unusedBits  I
            9   14     5     bitMask  B
    Exceptions:
      throws java.lang.IllegalArgumentException
    MethodParameters:
        Name  Flags
      length  
      a       

  public void <init>(boolean[]);
    descriptor: ([Z)V
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=4, locals=3, args_size=2
        start local 0 // sun.security.util.BitArray this
        start local 1 // boolean[] bits
         0: .line 106
            aload 0 /* this */
            invokespecial java.lang.Object.<init>:()V
         1: .line 107
            aload 0 /* this */
            aload 1 /* bits */
            arraylength
            putfield sun.security.util.BitArray.length:I
         2: .line 108
            aload 0 /* this */
            aload 0 /* this */
            getfield sun.security.util.BitArray.length:I
            bipush 7
            iadd
            bipush 8
            idiv
            newarray 8
            putfield sun.security.util.BitArray.repn:[B
         3: .line 110
            iconst_0
            istore 2 /* i */
        start local 2 // int i
         4: goto 7
         5: .line 111
      StackMap locals: sun.security.util.BitArray boolean[] int
      StackMap stack:
            aload 0 /* this */
            iload 2 /* i */
            aload 1 /* bits */
            iload 2 /* i */
            baload
            invokevirtual sun.security.util.BitArray.set:(IZ)V
         6: .line 110
            iinc 2 /* i */ 1
      StackMap locals:
      StackMap stack:
         7: iload 2 /* i */
            aload 0 /* this */
            getfield sun.security.util.BitArray.length:I
            if_icmplt 5
        end local 2 // int i
         8: .line 113
            return
        end local 1 // boolean[] bits
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot  Name  Signature
            0    9     0  this  Lsun/security/util/BitArray;
            0    9     1  bits  [Z
            4    8     2     i  I
    MethodParameters:
      Name  Flags
      bits  

  private void <init>(sun.security.util.BitArray);
    descriptor: (Lsun/security/util/BitArray;)V
    flags: (0x0002) ACC_PRIVATE
    Code:
      stack=2, locals=2, args_size=2
        start local 0 // sun.security.util.BitArray this
        start local 1 // sun.security.util.BitArray ba
         0: .line 119
            aload 0 /* this */
            invokespecial java.lang.Object.<init>:()V
         1: .line 120
            aload 0 /* this */
            aload 1 /* ba */
            getfield sun.security.util.BitArray.length:I
            putfield sun.security.util.BitArray.length:I
         2: .line 121
            aload 0 /* this */
            aload 1 /* ba */
            getfield sun.security.util.BitArray.repn:[B
            invokevirtual byte[].clone:()Ljava/lang/Object;
            checkcast byte[]
            putfield sun.security.util.BitArray.repn:[B
         3: .line 122
            return
        end local 1 // sun.security.util.BitArray ba
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot  Name  Signature
            0    4     0  this  Lsun/security/util/BitArray;
            0    4     1    ba  Lsun/security/util/BitArray;
    MethodParameters:
      Name  Flags
      ba    

  public boolean get(int);
    descriptor: (I)Z
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=3, locals=2, args_size=2
        start local 0 // sun.security.util.BitArray this
        start local 1 // int index
         0: .line 128
            iload 1 /* index */
            iflt 1
            iload 1 /* index */
            aload 0 /* this */
            getfield sun.security.util.BitArray.length:I
            if_icmplt 2
         1: .line 129
      StackMap locals:
      StackMap stack:
            new java.lang.ArrayIndexOutOfBoundsException
            dup
            iload 1 /* index */
            invokestatic java.lang.Integer.toString:(I)Ljava/lang/String;
            invokespecial java.lang.ArrayIndexOutOfBoundsException.<init>:(Ljava/lang/String;)V
            athrow
         2: .line 132
      StackMap locals:
      StackMap stack:
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            iload 1 /* index */
            invokestatic sun.security.util.BitArray.subscript:(I)I
            baload
            iload 1 /* index */
            invokestatic sun.security.util.BitArray.position:(I)I
            iand
            ifeq 3
            iconst_1
            ireturn
      StackMap locals:
      StackMap stack:
         3: iconst_0
            ireturn
        end local 1 // int index
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot   Name  Signature
            0    4     0   this  Lsun/security/util/BitArray;
            0    4     1  index  I
    Exceptions:
      throws java.lang.ArrayIndexOutOfBoundsException
    MethodParameters:
       Name  Flags
      index  

  public void set(int, boolean);
    descriptor: (IZ)V
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=5, locals=5, args_size=3
        start local 0 // sun.security.util.BitArray this
        start local 1 // int index
        start local 2 // boolean value
         0: .line 140
            iload 1 /* index */
            iflt 1
            iload 1 /* index */
            aload 0 /* this */
            getfield sun.security.util.BitArray.length:I
            if_icmplt 2
         1: .line 141
      StackMap locals:
      StackMap stack:
            new java.lang.ArrayIndexOutOfBoundsException
            dup
            iload 1 /* index */
            invokestatic java.lang.Integer.toString:(I)Ljava/lang/String;
            invokespecial java.lang.ArrayIndexOutOfBoundsException.<init>:(Ljava/lang/String;)V
            athrow
         2: .line 143
      StackMap locals:
      StackMap stack:
            iload 1 /* index */
            invokestatic sun.security.util.BitArray.subscript:(I)I
            istore 3 /* idx */
        start local 3 // int idx
         3: .line 144
            iload 1 /* index */
            invokestatic sun.security.util.BitArray.position:(I)I
            istore 4 /* bit */
        start local 4 // int bit
         4: .line 146
            iload 2 /* value */
            ifeq 7
         5: .line 147
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            iload 3 /* idx */
            dup2
            baload
            iload 4 /* bit */
            ior
            i2b
            bastore
         6: .line 148
            goto 8
         7: .line 149
      StackMap locals: int int
      StackMap stack:
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            iload 3 /* idx */
            dup2
            baload
            iload 4 /* bit */
            iconst_m1
            ixor
            iand
            i2b
            bastore
         8: .line 151
      StackMap locals:
      StackMap stack:
            return
        end local 4 // int bit
        end local 3 // int idx
        end local 2 // boolean value
        end local 1 // int index
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot   Name  Signature
            0    9     0   this  Lsun/security/util/BitArray;
            0    9     1  index  I
            0    9     2  value  Z
            3    9     3    idx  I
            4    9     4    bit  I
    Exceptions:
      throws java.lang.ArrayIndexOutOfBoundsException
    MethodParameters:
       Name  Flags
      index  
      value  

  public int length();
    descriptor: ()I
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=1, locals=1, args_size=1
        start local 0 // sun.security.util.BitArray this
         0: .line 157
            aload 0 /* this */
            getfield sun.security.util.BitArray.length:I
            ireturn
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot  Name  Signature
            0    1     0  this  Lsun/security/util/BitArray;

  public byte[] toByteArray();
    descriptor: ()[B
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=1, locals=1, args_size=1
        start local 0 // sun.security.util.BitArray this
         0: .line 170
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            invokevirtual byte[].clone:()Ljava/lang/Object;
            checkcast byte[]
            areturn
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot  Name  Signature
            0    1     0  this  Lsun/security/util/BitArray;

  public boolean equals(java.lang.Object);
    descriptor: (Ljava/lang/Object;)Z
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=3, locals=4, args_size=2
        start local 0 // sun.security.util.BitArray this
        start local 1 // java.lang.Object obj
         0: .line 174
            aload 1 /* obj */
            aload 0 /* this */
            if_acmpne 1
            iconst_1
            ireturn
         1: .line 175
      StackMap locals:
      StackMap stack:
            aload 1 /* obj */
            ifnull 2
            aload 1 /* obj */
            instanceof sun.security.util.BitArray
            ifne 3
      StackMap locals:
      StackMap stack:
         2: iconst_0
            ireturn
         3: .line 177
      StackMap locals:
      StackMap stack:
            aload 1 /* obj */
            checkcast sun.security.util.BitArray
            astore 2 /* ba */
        start local 2 // sun.security.util.BitArray ba
         4: .line 179
            aload 2 /* ba */
            getfield sun.security.util.BitArray.length:I
            aload 0 /* this */
            getfield sun.security.util.BitArray.length:I
            if_icmpeq 5
            iconst_0
            ireturn
         5: .line 181
      StackMap locals: sun.security.util.BitArray
      StackMap stack:
            iconst_0
            istore 3 /* i */
        start local 3 // int i
         6: goto 9
         7: .line 182
      StackMap locals: int
      StackMap stack:
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            iload 3 /* i */
            baload
            aload 2 /* ba */
            getfield sun.security.util.BitArray.repn:[B
            iload 3 /* i */
            baload
            if_icmpeq 8
            iconst_0
            ireturn
         8: .line 181
      StackMap locals:
      StackMap stack:
            iinc 3 /* i */ 1
      StackMap locals:
      StackMap stack:
         9: iload 3 /* i */
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            arraylength
            if_icmplt 7
        end local 3 // int i
        10: .line 184
            iconst_1
            ireturn
        end local 2 // sun.security.util.BitArray ba
        end local 1 // java.lang.Object obj
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot  Name  Signature
            0   11     0  this  Lsun/security/util/BitArray;
            0   11     1   obj  Ljava/lang/Object;
            4   11     2    ba  Lsun/security/util/BitArray;
            6   10     3     i  I
    MethodParameters:
      Name  Flags
      obj   

  public boolean[] toBooleanArray();
    descriptor: ()[Z
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=4, locals=3, args_size=1
        start local 0 // sun.security.util.BitArray this
         0: .line 191
            aload 0 /* this */
            getfield sun.security.util.BitArray.length:I
            newarray 4
            astore 1 /* bits */
        start local 1 // boolean[] bits
         1: .line 193
            iconst_0
            istore 2 /* i */
        start local 2 // int i
         2: goto 5
         3: .line 194
      StackMap locals: boolean[] int
      StackMap stack:
            aload 1 /* bits */
            iload 2 /* i */
            aload 0 /* this */
            iload 2 /* i */
            invokevirtual sun.security.util.BitArray.get:(I)Z
            bastore
         4: .line 193
            iinc 2 /* i */ 1
      StackMap locals:
      StackMap stack:
         5: iload 2 /* i */
            aload 0 /* this */
            getfield sun.security.util.BitArray.length:I
            if_icmplt 3
        end local 2 // int i
         6: .line 196
            aload 1 /* bits */
            areturn
        end local 1 // boolean[] bits
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot  Name  Signature
            0    7     0  this  Lsun/security/util/BitArray;
            1    7     1  bits  [Z
            2    6     2     i  I

  public int hashCode();
    descriptor: ()I
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=3, locals=3, args_size=1
        start local 0 // sun.security.util.BitArray this
         0: .line 205
            iconst_0
            istore 1 /* hashCode */
        start local 1 // int hashCode
         1: .line 207
            iconst_0
            istore 2 /* i */
        start local 2 // int i
         2: goto 5
         3: .line 208
      StackMap locals: int int
      StackMap stack:
            bipush 31
            iload 1 /* hashCode */
            imul
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            iload 2 /* i */
            baload
            iadd
            istore 1 /* hashCode */
         4: .line 207
            iinc 2 /* i */ 1
      StackMap locals:
      StackMap stack:
         5: iload 2 /* i */
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            arraylength
            if_icmplt 3
        end local 2 // int i
         6: .line 210
            iload 1 /* hashCode */
            aload 0 /* this */
            getfield sun.security.util.BitArray.length:I
            ixor
            ireturn
        end local 1 // int hashCode
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot      Name  Signature
            0    7     0      this  Lsun/security/util/BitArray;
            1    7     1  hashCode  I
            2    6     2         i  I

  public java.lang.Object clone();
    descriptor: ()Ljava/lang/Object;
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=3, locals=1, args_size=1
        start local 0 // sun.security.util.BitArray this
         0: .line 215
            new sun.security.util.BitArray
            dup
            aload 0 /* this */
            invokespecial sun.security.util.BitArray.<init>:(Lsun/security/util/BitArray;)V
            areturn
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot  Name  Signature
            0    1     0  this  Lsun/security/util/BitArray;

  public java.lang.String toString();
    descriptor: ()Ljava/lang/String;
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=4, locals=3, args_size=1
        start local 0 // sun.security.util.BitArray this
         0: .line 244
            aload 0 /* this */
            getfield sun.security.util.BitArray.length:I
            ifne 2
         1: .line 245
            ldc ""
            areturn
         2: .line 248
      StackMap locals:
      StackMap stack:
            new java.io.ByteArrayOutputStream
            dup
            invokespecial java.io.ByteArrayOutputStream.<init>:()V
            astore 1 /* out */
        start local 1 // java.io.ByteArrayOutputStream out
         3: .line 250
            iconst_0
            istore 2 /* i */
        start local 2 // int i
         4: goto 12
         5: .line 251
      StackMap locals: java.io.ByteArrayOutputStream int
      StackMap stack:
            aload 1 /* out */
            getstatic sun.security.util.BitArray.NYBBLE:[[B
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            iload 2 /* i */
            baload
            iconst_4
            ishr
            bipush 15
            iand
            aaload
            iconst_0
            iconst_4
            invokevirtual java.io.ByteArrayOutputStream.write:([BII)V
         6: .line 252
            aload 1 /* out */
            getstatic sun.security.util.BitArray.NYBBLE:[[B
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            iload 2 /* i */
            baload
            bipush 15
            iand
            aaload
            iconst_0
            iconst_4
            invokevirtual java.io.ByteArrayOutputStream.write:([BII)V
         7: .line 254
            iload 2 /* i */
            bipush 8
            irem
            bipush 7
            if_icmpne 10
         8: .line 255
            aload 1 /* out */
            bipush 10
            invokevirtual java.io.ByteArrayOutputStream.write:(I)V
         9: .line 256
            goto 11
        10: .line 257
      StackMap locals:
      StackMap stack:
            aload 1 /* out */
            bipush 32
            invokevirtual java.io.ByteArrayOutputStream.write:(I)V
        11: .line 250
      StackMap locals:
      StackMap stack:
            iinc 2 /* i */ 1
      StackMap locals:
      StackMap stack:
        12: iload 2 /* i */
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            arraylength
            iconst_1
            isub
            if_icmplt 5
        end local 2 // int i
        13: .line 262
            bipush 8
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            arraylength
            iconst_1
            isub
            imul
            istore 2 /* i */
        start local 2 // int i
        14: goto 19
        15: .line 263
      StackMap locals:
      StackMap stack:
            aload 1 /* out */
            aload 0 /* this */
            iload 2 /* i */
            invokevirtual sun.security.util.BitArray.get:(I)Z
            ifeq 16
            bipush 49
            goto 17
      StackMap locals:
      StackMap stack: java.io.ByteArrayOutputStream
        16: bipush 48
      StackMap locals: sun.security.util.BitArray java.io.ByteArrayOutputStream int
      StackMap stack: java.io.ByteArrayOutputStream int
        17: invokevirtual java.io.ByteArrayOutputStream.write:(I)V
        18: .line 262
            iinc 2 /* i */ 1
      StackMap locals:
      StackMap stack:
        19: iload 2 /* i */
            aload 0 /* this */
            getfield sun.security.util.BitArray.length:I
            if_icmplt 15
        end local 2 // int i
        20: .line 266
            new java.lang.String
            dup
            aload 1 /* out */
            invokevirtual java.io.ByteArrayOutputStream.toByteArray:()[B
            invokespecial java.lang.String.<init>:([B)V
            areturn
        end local 1 // java.io.ByteArrayOutputStream out
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot  Name  Signature
            0   21     0  this  Lsun/security/util/BitArray;
            3   21     1   out  Ljava/io/ByteArrayOutputStream;
            4   13     2     i  I
           14   20     2     i  I

  public sun.security.util.BitArray truncate();
    descriptor: ()Lsun/security/util/BitArray;
    flags: (0x0001) ACC_PUBLIC
    Code:
      stack=6, locals=2, args_size=1
        start local 0 // sun.security.util.BitArray this
         0: .line 271
            aload 0 /* this */
            getfield sun.security.util.BitArray.length:I
            iconst_1
            isub
            istore 1 /* i */
        start local 1 // int i
         1: goto 5
         2: .line 272
      StackMap locals: int
      StackMap stack:
            aload 0 /* this */
            iload 1 /* i */
            invokevirtual sun.security.util.BitArray.get:(I)Z
            ifeq 4
         3: .line 273
            new sun.security.util.BitArray
            dup
            iload 1 /* i */
            iconst_1
            iadd
            aload 0 /* this */
            getfield sun.security.util.BitArray.repn:[B
            iload 1 /* i */
            bipush 8
            iadd
            bipush 8
            idiv
            invokestatic java.util.Arrays.copyOf:([BI)[B
            invokespecial sun.security.util.BitArray.<init>:(I[B)V
            areturn
         4: .line 271
      StackMap locals:
      StackMap stack:
            iinc 1 /* i */ -1
      StackMap locals:
      StackMap stack:
         5: iload 1 /* i */
            ifge 2
        end local 1 // int i
         6: .line 276
            new sun.security.util.BitArray
            dup
            iconst_1
            invokespecial sun.security.util.BitArray.<init>:(I)V
            areturn
        end local 0 // sun.security.util.BitArray this
      LocalVariableTable:
        Start  End  Slot  Name  Signature
            0    7     0  this  Lsun/security/util/BitArray;
            1    6     1     i  I
}
SourceFile: "BitArray.java"