|
1 | 1 | | broken_crypto.rb:4:8:4:34 | call to new | The cryptographic algorithm DES is broken or weak, and should not be used. | |
2 | 2 | | broken_crypto.rb:8:1:8:18 | call to update | The cryptographic algorithm DES is broken or weak, and should not be used. | |
3 | | -| broken_crypto.rb:12:8:12:43 | call to new | The cryptographic algorithm AES is broken or weak, and should not be used. | |
4 | | -| broken_crypto.rb:16:1:16:18 | call to update | The cryptographic algorithm AES is broken or weak, and should not be used. | |
5 | | -| broken_crypto.rb:28:1:28:35 | call to new | The cryptographic algorithm AES is broken or weak, and should not be used. | |
6 | | -| broken_crypto.rb:37:1:37:33 | call to new | The cryptographic algorithm AES is broken or weak, and should not be used. | |
7 | | -| broken_crypto.rb:42:1:42:33 | call to new | The cryptographic algorithm AES is broken or weak, and should not be used. | |
8 | | -| broken_crypto.rb:47:1:47:33 | call to new | The cryptographic algorithm AES is broken or weak, and should not be used. | |
9 | | -| broken_crypto.rb:52:1:52:29 | call to new | The cryptographic algorithm BF is broken or weak, and should not be used. | |
10 | | -| broken_crypto.rb:57:1:57:32 | call to new | The cryptographic algorithm CAST5 is broken or weak, and should not be used. | |
| 3 | +| broken_crypto.rb:12:8:12:43 | call to new | The block mode ECB is broken or weak, and should not be used. | |
| 4 | +| broken_crypto.rb:16:1:16:18 | call to update | The block mode ECB is broken or weak, and should not be used. | |
| 5 | +| broken_crypto.rb:28:1:28:35 | call to new | The block mode ECB is broken or weak, and should not be used. | |
| 6 | +| broken_crypto.rb:37:1:37:33 | call to new | The block mode ECB is broken or weak, and should not be used. | |
| 7 | +| broken_crypto.rb:42:1:42:33 | call to new | The block mode ECB is broken or weak, and should not be used. | |
| 8 | +| broken_crypto.rb:47:1:47:33 | call to new | The block mode ECB is broken or weak, and should not be used. | |
| 9 | +| broken_crypto.rb:52:1:52:29 | call to new | The block mode ECB is broken or weak, and should not be used. | |
| 10 | +| broken_crypto.rb:57:1:57:32 | call to new | The block mode ECB is broken or weak, and should not be used. | |
11 | 11 | | broken_crypto.rb:60:1:60:24 | call to new | The cryptographic algorithm DES is broken or weak, and should not be used. | |
12 | 12 | | broken_crypto.rb:62:1:62:30 | call to new | The cryptographic algorithm DES is broken or weak, and should not be used. | |
13 | | -| broken_crypto.rb:67:1:67:31 | call to new | The cryptographic algorithm IDEA is broken or weak, and should not be used. | |
| 13 | +| broken_crypto.rb:67:1:67:31 | call to new | The block mode ECB is broken or weak, and should not be used. | |
14 | 14 | | broken_crypto.rb:70:1:70:24 | call to new | The cryptographic algorithm RC2 is broken or weak, and should not be used. | |
| 15 | +| broken_crypto.rb:72:1:72:30 | call to new | The block mode ECB is broken or weak, and should not be used. | |
15 | 16 | | broken_crypto.rb:72:1:72:30 | call to new | The cryptographic algorithm RC2 is broken or weak, and should not be used. | |
16 | 17 | | broken_crypto.rb:75:1:75:24 | call to new | The cryptographic algorithm RC4 is broken or weak, and should not be used. | |
17 | 18 | | broken_crypto.rb:77:1:77:29 | call to new | The cryptographic algorithm RC4 is broken or weak, and should not be used. | |
|
0 commit comments