Info Call to Crypto API

Description

List of all calls to cryptographic methods.

Recommendation

Do not use insecure or weak cryptographic algorithms. For example, the Data Encryption Standard (DES) encryption algorithm is considered highly insecure

Do not use Object.equals() to compare cryptographic keys

Cryptographic keys should never be serialized

Technical details

Method com.razorpay.l__d$.R$$r_() calling method javax.crypto.spec.IvParameterSpec.<init>()


    private String R$$r_(String p6, String p7, com.razorpay.l__d$$a_$P$ p8, String p9)
    {
        String v0_0 = "";
        com.razorpay.l__d$$a_$P$ v1_2 = p7.getBytes("UTF-8").length;
        if (p7.getBytes("UTF-8").length > this.G__G_.length) {
            v1_2 = this.G__G_.length;
        }
        int v2_2 = p9.getBytes("UTF-8").length;
        if (p9.getBytes("UTF-8").length > this.R$$r_.length) {
            v2_2 = this.R$$r_.length;
        }
        System.arraycopy(p7.getBytes("UTF-8"), 0, this.G__G_, 0, v1_2);
        System.arraycopy(p9.getBytes("UTF-8"), 0, this.R$$r_, 0, v2_2);
        javax.crypto.Cipher v7_5 = new javax.crypto.spec.SecretKeySpec(this.G__G_, "AES");
        javax.crypto.spec.IvParameterSpec v9_4 = new javax.crypto.spec.IvParameterSpec(this.R$$r_);
        if (p8.equals(com.razorpay.l__d$$a_$P$.R$$r_)) {
            this.a_$P$.init(1, v7_5, v9_4);
            v0_0 = android.util.Base64.encodeToString(this.a_$P$.doFinal(p6.getBytes("UTF-8")), 2);
        }
        if (p8.equals(com.razorpay.l__d$$a_$P$.G__G_)) {
            this.a_$P$.init(2, v7_5, v9_4);
            v0_0 = new String(this.a_$P$.doFinal(android.util.Base64.decode(p6.getBytes(), 2)));
        }
        return v0_0;
    }

Method in.juspay.godel.util.EncryptionHelper.a() calling method javax.crypto.KeyGenerator.getInstance()


    public void a(String p6, java.security.KeyStore p7, android.content.Context p8)
    {
        try {
            if (!p7.containsAlias(p6)) {
                java.security.KeyPairGenerator v7_4 = java.util.Calendar.getInstance();
                java.math.BigInteger v0_1 = java.util.Calendar.getInstance();
                v0_1.add(1, 1);
                if (android.os.Build$VERSION.SDK_INT >= 23) {
                    String v8_2 = javax.crypto.KeyGenerator.getInstance("AES", "AndroidKeyStore");
                    String[] v2_2 = new android.security.keystore.KeyGenParameterSpec$Builder(p6, 3);
                    android.security.KeyPairGeneratorSpec v6_3 = new String[1];
                    v6_3[0] = "GCM";
                    android.security.KeyPairGeneratorSpec v6_6 = v2_2.setBlockModes(v6_3).setKeySize(256).setRandomizedEncryptionRequired(1);
                    String[] v2_4 = new String[1];
                    v2_4[0] = "NoPadding";
                    v8_2.init(v6_6.setEncryptionPaddings(v2_4).setUserAuthenticationRequired(1).setUserAuthenticationValidityDurationSeconds(3600).setKeyValidityStart(v7_4.getTime()).setKeyValidityEnd(v0_1.getTime()).setKeyValidityForConsumptionEnd(v0_1.getTime()).setCertificateSubject(new javax.security.auth.x500.X500Principal("CN=Safe Browser, O=Juspay Technologies")).setCertificateSerialNumber(java.math.BigInteger.ONE).build());
                    v8_2.generateKey();
                } else {
                    android.security.KeyPairGeneratorSpec v6_21 = new android.security.KeyPairGeneratorSpec$Builder(p8).setAlias(p6).setSubject(new javax.security.auth.x500.X500Principal("CN=Safe Browser, O=Juspay Technologies")).setSerialNumber(java.math.BigInteger.ONE).setStartDate(v7_4.getTime()).setEndDate(v0_1.getTime()).setEncryptionRequired();
                    if (android.os.Build$VERSION.SDK_INT > 18) {
                        v6_21 = v6_21.setAlgorithmParameterSpec(new java.security.spec.RSAKeyGenParameterSpec(2048, java.security.spec.RSAKeyGenParameterSpec.F4));
                    }
                    android.security.KeyPairGeneratorSpec v6_22 = v6_21.build();
                    java.security.KeyPairGenerator v7_2 = java.security.KeyPairGenerator.getInstance("RSA", "AndroidKeyStore");
                    v7_2.initialize(v6_22);
                    v7_2.generateKeyPair();
                    return;
                }
            }
        } catch (android.security.KeyPairGeneratorSpec v6_1) {
            in.juspay.godel.util.JuspayLogger.b(ark>in.juspay.godel.util.EncryptionHelperark>.d, v6_1.toString());
            return;
        }
        return;
    }

Method com.freshchat.consumer.sdk.b.h.ci() calling method javax.crypto.KeyGenerator.getInstance()


    private static String ci()
    {
        String v0_1 = new java.security.SecureRandom();
        javax.crypto.KeyGenerator v1_1 = javax.crypto.KeyGenerator.getInstance("AES");
        v1_1.init(256, v0_1);
    }

Method in.juspay.godel.util.EncryptionHelper.a() calling method javax.crypto.KeyGenerator.generateKey()


    public void a(String p6, java.security.KeyStore p7, android.content.Context p8)
    {
        try {
            if (!p7.containsAlias(p6)) {
                java.security.KeyPairGenerator v7_4 = java.util.Calendar.getInstance();
                java.math.BigInteger v0_1 = java.util.Calendar.getInstance();
                v0_1.add(1, 1);
                if (android.os.Build$VERSION.SDK_INT >= 23) {
                    String v8_2 = javax.crypto.KeyGenerator.getInstance("AES", "AndroidKeyStore");
                    String[] v2_2 = new android.security.keystore.KeyGenParameterSpec$Builder(p6, 3);
                    android.security.KeyPairGeneratorSpec v6_3 = new String[1];
                    v6_3[0] = "GCM";
                    android.security.KeyPairGeneratorSpec v6_6 = v2_2.setBlockModes(v6_3).setKeySize(256).setRandomizedEncryptionRequired(1);
                    String[] v2_4 = new String[1];
                    v2_4[0] = "NoPadding";
                    v8_2.init(v6_6.setEncryptionPaddings(v2_4).setUserAuthenticationRequired(1).setUserAuthenticationValidityDurationSeconds(3600).setKeyValidityStart(v7_4.getTime()).setKeyValidityEnd(v0_1.getTime()).setKeyValidityForConsumptionEnd(v0_1.getTime()).setCertificateSubject(new javax.security.auth.x500.X500Principal("CN=Safe Browser, O=Juspay Technologies")).setCertificateSerialNumber(java.math.BigInteger.ONE).build());
                    v8_2.generateKey();
                } else {
                    android.security.KeyPairGeneratorSpec v6_21 = new android.security.KeyPairGeneratorSpec$Builder(p8).setAlias(p6).setSubject(new javax.security.auth.x500.X500Principal("CN=Safe Browser, O=Juspay Technologies")).setSerialNumber(java.math.BigInteger.ONE).setStartDate(v7_4.getTime()).setEndDate(v0_1.getTime()).setEncryptionRequired();
                    if (android.os.Build$VERSION.SDK_INT > 18) {
                        v6_21 = v6_21.setAlgorithmParameterSpec(new java.security.spec.RSAKeyGenParameterSpec(2048, java.security.spec.RSAKeyGenParameterSpec.F4));
                    }
                    android.security.KeyPairGeneratorSpec v6_22 = v6_21.build();
                    java.security.KeyPairGenerator v7_2 = java.security.KeyPairGenerator.getInstance("RSA", "AndroidKeyStore");
                    v7_2.initialize(v6_22);
                    v7_2.generateKeyPair();
                    return;
                }
            }
        } catch (android.security.KeyPairGeneratorSpec v6_1) {
            in.juspay.godel.util.JuspayLogger.b(ark>in.juspay.godel.util.EncryptionHelperark>.d, v6_1.toString());
            return;
        }
        return;
    }

Method com.freshchat.consumer.sdk.b.h.ci() calling method javax.crypto.KeyGenerator.generateKey()


    private static String ci()
    {
        String v0_1 = new java.security.SecureRandom();
        javax.crypto.KeyGenerator v1_1 = javax.crypto.KeyGenerator.getInstance("AES");
        v1_1.init(256, v0_1);
    }

Method in.juspay.godel.util.EncryptionHelper.c() calling method javax.crypto.Cipher.getInstance()


    public byte[] c(byte[] p10, String p11)
    {
        if (!p11.equalsIgnoreCase("v0")) {
            byte[] v1_1 = new byte[8];
            new java.security.SecureRandom().nextBytes(v1_1);
            int v11_5 = p10.length;
            int v2 = (v11_5 + 8);
            byte[] v3 = new byte[v2];
            int v4 = 0;
            int v5 = 0;
            int v6 = 0;
            while ((v4 < v11_5) && (v5 < v2)) {
                if ((v5 <= 0) || (((v5 % 10) != 9) || (v6 >= 8))) {
                    v3[v5] = ((byte) (p10[v4] ^ v1_1[(v4 % 8)]));
                    v4++;
                } else {
                    v3[v5] = v1_1[v6];
                    v6++;
                }
                v5++;
            }
            return v3;
        } else {
            int v11_2 = this.c();
            int v0_2 = javax.crypto.Cipher.getInstance(in.juspay.godel.util.EncryptionHelper.a);
            v0_2.init(1, v11_2);
            return v0_2.doFinal(p10);
        }
    }

Method in.juspay.godel.util.EncryptionHelper.b() calling method javax.crypto.Cipher.getInstance()


    public byte[] b(byte[] p10, String p11)
    {
        try {
            if (!p11.equalsIgnoreCase("v0")) {
                byte[] v1_0 = new byte[8];
                byte[] v2_2 = new byte[(p10.length - 8)];
                int v3 = p10.length;
                int v6 = 0;
                v1_0[0] = p10[9];
                v1_0[1] = p10[19];
                v1_0[2] = p10[29];
                v1_0[3] = p10[39];
                v1_0[4] = p10[49];
                v1_0[5] = p10[59];
                v1_0[6] = p10[69];
                v1_0[7] = p10[79];
                int v0_7 = 0;
                int v5_15 = 0;
                while (v6 < v3) {
                    if ((v6 <= 0) || (((v6 % 10) != 9) || (v0_7 >= 8))) {
                        v2_2[v5_15] = ((byte) (p10[v6] ^ v1_0[(v5_15 % 8)]));
                        v5_15++;
                    } else {
                        v0_7++;
                    }
                    v6++;
                }
                return v2_2;
            } else {
                int v11_3 = this.c();
                byte[] v1_2 = javax.crypto.Cipher.getInstance(in.juspay.godel.util.EncryptionHelper.a);
                v1_2.init(2, v11_3);
                return v1_2.doFinal(p10);
            }
        } catch (byte[] v10_2) {
            in.juspay.godel.util.JuspayLogger.b(in.juspay.godel.util.EncryptionHelper.d, "Decryption Error", v10_2);
            throw new RuntimeException(v10_2);
        }
    }

Method in.juspay.godel.util.EncryptionHelper.a() calling method javax.crypto.Cipher.getInstance()


    public byte[] a(String p7, String p8, java.security.KeyStore p9)
    {
        try {
            if (!p8.isEmpty()) {
                int v3_1;
                if (android.os.Build$VERSION.SDK_INT >= 23) {
                    int v1_1 = ((javax.crypto.SecretKey) p9.getKey(p7, 0));
                    v3_1 = javax.crypto.Cipher.getInstance("AES/GCM/NoPadding");
                    v3_1.init(1, v1_1);
                } else {
                    int v1_7 = ((java.security.interfaces.RSAPublicKey) ((java.security.KeyStore$PrivateKeyEntry) p9.getEntry(p7, 0)).getCertificate().getPublicKey());
                    v3_1 = javax.crypto.Cipher.getInstance("RSA/ECB/PKCS1Padding", "AndroidOpenSSL");
                    v3_1.init(1, v1_7);
                }
                byte[] v8_6;
                int v1_9 = new java.io.ByteArrayOutputStream();
                byte[] v2_1 = new javax.crypto.CipherOutputStream(v1_9, v3_1);
                v2_1.write(p8.getBytes("UTF-8"));
                v2_1.close();
                if (android.os.Build$VERSION.SDK_INT >= 23) {
                    v8_6 = new byte[(v3_1.getIV().length + v1_9.toByteArray().length)];
                    System.arraycopy(v3_1.getIV(), 0, v8_6, 0, v3_1.getIV().length);
                    System.arraycopy(v1_9.toByteArray(), 0, v8_6, v3_1.getIV().length, v1_9.toByteArray().length);
                } else {
                    v8_6 = new byte[v1_9.toByteArray().length];
                    System.arraycopy(v1_9.toByteArray(), 0, v8_6, 0, v1_9.toByteArray().length);
                }
                return v8_6;
            } else {
                byte[] v8_9 = new byte[0];
                return v8_9;
            }
        } catch (byte[] v8_10) {
            in.juspay.godel.util.JuspayLogger.b(ark>in.juspay.godel.util.EncryptionHelperark>.d, "", v8_10);
            if ((v8_10 instanceof android.security.keystore.KeyPermanentlyInvalidatedException)) {
                try {
                    if (p9.containsAlias(p7)) {
                        p9.deleteEntry(p7);
                    }
                } catch (java.security.KeyStoreException) {
                    in.juspay.godel.util.JuspayLogger.b(ark>in.juspay.godel.util.EncryptionHelperark>.d, "", v8_10);
                }
            }
            String v7_2 = new byte[0];
            return v7_2;
        }
    }

Method in.juspay.godel.util.EncryptionHelper.a() calling method javax.crypto.Cipher.getInstance()


    public String a(String p10, byte[] p11, java.security.KeyStore p12)
    {
        try {
            byte[] v1_2;
            if (android.os.Build$VERSION.SDK_INT >= 23) {
                byte[] v1_12 = ((javax.crypto.SecretKey) p12.getKey(p10, 0));
                int v2_1 = javax.crypto.Cipher.getInstance("AES/GCM/NoPadding");
                v2_1.init(2, v1_12, new javax.crypto.spec.GCMParameterSpec(128, java.util.Arrays.copyOfRange(p11, 0, 12)));
                v1_2 = new javax.crypto.CipherInputStream(new java.io.ByteArrayInputStream(java.util.Arrays.copyOfRange(p11, 12, p11.length)), v2_1);
                String v11_3 = new java.util.ArrayList();
                while(true) {
                    int v2_5 = v1_2.read();
                    if (v2_5 == -1) {
                        break;
                    }
                    v11_3.add(Byte.valueOf(((byte) v2_5)));
                }
                byte[] v1_8 = new byte[v11_3.size()];
                int v2_6 = 0;
                while (v2_6 < v1_8.length) {
                    v1_8[v2_6] = ((Byte) v11_3.get(v2_6)).byteValue();
                    v2_6++;
                }
                String v11_5 = new String(v1_8, 0, v1_8.length, "UTF-8");
            } else {
                byte[] v1_5 = ((java.security.KeyStore$PrivateKeyEntry) p12.getEntry(p10, 0)).getPrivateKey();
                int v2_4 = javax.crypto.Cipher.getInstance("RSA/ECB/PKCS1Padding");
                v2_4.init(2, v1_5);
                v1_2 = new javax.crypto.CipherInputStream(new java.io.ByteArrayInputStream(p11), v2_4);
            }
        } catch (String v11_6) {
            if ((v11_6 instanceof android.security.keystore.KeyPermanentlyInvalidatedException)) {
                try {
                    if (p12.containsAlias(p10)) {
                        p12.deleteEntry(p10);
                    }
                } catch (java.security.KeyStoreException) {
                    in.juspay.godel.util.JuspayLogger.b(ark>in.juspay.godel.util.EncryptionHelperark>.d, "", v11_6);
                }
            }
            in.juspay.godel.util.JuspayLogger.b(ark>in.juspay.godel.util.EncryptionHelperark>.d, "", v11_6);
            v11_5 = "";
        }
        return v11_5;
    }

Method com.userexperior.utilities.c.a() calling method javax.crypto.Cipher.getInstance()


    public static byte[] a(byte[] p2, byte[] p3)
    {
        javax.crypto.spec.SecretKeySpec v0_1 = new javax.crypto.spec.SecretKeySpec(p2, "AES");
        try {
            int v2_9 = javax.crypto.Cipher.getInstance("AES");
            v2_9.init(1, v0_1);
            return v2_9.doFinal(p3);
        } catch (int v2_6) {
            v2_6.printStackTrace();
            return 0;
        } catch (int v2_5) {
            v2_5.printStackTrace();
            return 0;
        } catch (int v2_4) {
            v2_4.printStackTrace();
            return 0;
        } catch (int v2_3) {
            v2_3.printStackTrace();
            return 0;
        } catch (int v2_2) {
            v2_2.printStackTrace();
            return 0;
        } catch (int v2_1) {
            v2_1.printStackTrace();
            return 0;
        }
    }

Method com.userexperior.utilities.c.a() calling method javax.crypto.Cipher.getInstance()


    public static byte[] a(byte[] p4)
    {
        try {
            java.security.PublicKey v1_2 = ark>com.userexperior.utilities.cark>.a(com.userexperior.utilities.i.j(com.userexperior.UserExperior.getUeContext()));
        } catch (int v4_7) {
            v4_7.printStackTrace();
            return 0;
        } catch (int v4_6) {
            v4_6.printStackTrace();
            return 0;
        } catch (int v4_5) {
            v4_5.printStackTrace();
            return 0;
        } catch (int v4_4) {
            v4_4.printStackTrace();
            return 0;
        } catch (int v4_3) {
            v4_3.printStackTrace();
            return 0;
        } catch (int v4_2) {
            v4_2.printStackTrace();
            return 0;
        }
        if (v1_2 != null) {
            javax.crypto.Cipher v2_0 = javax.crypto.Cipher.getInstance("RSA/ECB/PKCS1Padding");
            v2_0.init(1, v1_2);
            return v2_0.doFinal(p4);
        } else {
            return 0;
        }
    }

Method com.razorpay.l__d$.<init>() calling method javax.crypto.Cipher.getInstance()


    l__d$()
    {
        this.a_$P$ = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5Padding");
        byte[] v0_3 = new byte[32];
        this.G__G_ = v0_3;
        byte[] v0_5 = new byte[16];
        this.R$$r_ = v0_5;
        return;
    }

Method com.freshchat.consumer.sdk.b.h.N() calling method javax.crypto.Cipher.getInstance()


    private static String N(String p5)
    {
        if (p5 != 0) {
            if (p5.length() != 0) {
                try {
                    String v0_5 = javax.crypto.Cipher.getInstance("AES", "BC");
                    v0_5.init(2, new javax.crypto.spec.SecretKeySpec(com.freshchat.consumer.sdk.b.h.dR, "AES"));
                    return new String(v0_5.doFinal(com.freshchat.consumer.sdk.b.h.decode(p5)), "UTF-8");
                } catch (int v5_3) {
                    if (com.freshchat.consumer.sdk.b.h.dS) {
                        com.freshchat.consumer.sdk.j.ai.b("FRESHCHAT", "decrypt", v5_3);
                    }
                    p5 = 0;
                }
            } else {
                return p5;
            }
        }
        return p5;
    }

Method com.freshchat.consumer.sdk.b.h.M() calling method javax.crypto.Cipher.getInstance()


    private static String M(String p5)
    {
        if (p5 != 0) {
            if (p5.length() != 0) {
                try {
                    String v0_4 = javax.crypto.Cipher.getInstance("AES", "BC");
                    v0_4.init(1, new javax.crypto.spec.SecretKeySpec(com.freshchat.consumer.sdk.b.h.dR, "AES"));
                    return com.freshchat.consumer.sdk.b.h.a(v0_4.doFinal(p5.getBytes("UTF-8")));
                } catch (int v5_4) {
                    if (com.freshchat.consumer.sdk.b.h.dS) {
                        com.freshchat.consumer.sdk.j.ai.b("FRESHCHAT", "encrypt", v5_4);
                    }
                    p5 = 0;
                }
            } else {
                return p5;
            }
        }
        return p5;
    }

Method com.bharatmatrimony.common.Config.encryptmymobilenumber() calling method javax.crypto.Cipher.getInstance()


    public String encryptmymobilenumber(String p4, String p5)
    {
        String v5_0 = "";
        try {
            int v0_2 = new javax.crypto.spec.SecretKeySpec("iErTmJn14eaRakHi".getBytes(), "AES");
            javax.crypto.Cipher v1_3 = javax.crypto.Cipher.getInstance("AES/ECB/PKCS5Padding");
            v1_3.init(1, v0_2);
            byte[] v4_2 = v1_3.doFinal(p4.getBytes());
        } catch (Exception) {
            v4_2 = 0;
        }
        if (v4_2 != null) {
            v5_0 = new String(android.util.Base64.encode(v4_2, 0));
        }
        return v5_0;
    }

Method com.bharatmatrimony.common.Config.encryptMatriid() calling method javax.crypto.Cipher.getInstance()


    public String encryptMatriid(String p4, String p5)
    {
        String v0_0 = "";
        try {
            javax.crypto.spec.SecretKeySpec v1_1 = new javax.crypto.spec.SecretKeySpec(p5.getBytes(), "AES");
            int v5_4 = javax.crypto.Cipher.getInstance("AES/ECB/PKCS5Padding");
            v5_4.init(1, v1_1);
            byte[] v4_2 = v5_4.doFinal(p4.getBytes());
        } catch (Exception) {
            v4_2 = 0;
        }
        if (v4_2 != null) {
            v0_0 = new String(android.util.Base64.encode(v4_2, 0));
        }
        return v0_0;
    }

Method in.juspay.godel.util.EncryptionHelper.a() calling method javax.crypto.Cipher.getIV()


    public byte[] a(String p7, String p8, java.security.KeyStore p9)
    {
        try {
            if (!p8.isEmpty()) {
                int v3_1;
                if (android.os.Build$VERSION.SDK_INT >= 23) {
                    int v1_1 = ((javax.crypto.SecretKey) p9.getKey(p7, 0));
                    v3_1 = javax.crypto.Cipher.getInstance("AES/GCM/NoPadding");
                    v3_1.init(1, v1_1);
                } else {
                    int v1_7 = ((java.security.interfaces.RSAPublicKey) ((java.security.KeyStore$PrivateKeyEntry) p9.getEntry(p7, 0)).getCertificate().getPublicKey());
                    v3_1 = javax.crypto.Cipher.getInstance("RSA/ECB/PKCS1Padding", "AndroidOpenSSL");
                    v3_1.init(1, v1_7);
                }
                byte[] v8_6;
                int v1_9 = new java.io.ByteArrayOutputStream();
                byte[] v2_1 = new javax.crypto.CipherOutputStream(v1_9, v3_1);
                v2_1.write(p8.getBytes("UTF-8"));
                v2_1.close();
                if (android.os.Build$VERSION.SDK_INT >= 23) {
                    v8_6 = new byte[(v3_1.getIV().length + v1_9.toByteArray().length)];
                    System.arraycopy(v3_1.getIV(), 0, v8_6, 0, v3_1.getIV().length);
                    System.arraycopy(v1_9.toByteArray(), 0, v8_6, v3_1.getIV().length, v1_9.toByteArray().length);
                } else {
                    v8_6 = new byte[v1_9.toByteArray().length];
                    System.arraycopy(v1_9.toByteArray(), 0, v8_6, 0, v1_9.toByteArray().length);
                }
                return v8_6;
            } else {
                byte[] v8_9 = new byte[0];
                return v8_9;
            }
        } catch (byte[] v8_10) {
            in.juspay.godel.util.JuspayLogger.b(ark>in.juspay.godel.util.EncryptionHelperark>.d, "", v8_10);
            if ((v8_10 instanceof android.security.keystore.KeyPermanentlyInvalidatedException)) {
                try {
                    if (p9.containsAlias(p7)) {
                        p9.deleteEntry(p7);
                    }
                } catch (java.security.KeyStoreException) {
                    in.juspay.godel.util.JuspayLogger.b(ark>in.juspay.godel.util.EncryptionHelperark>.d, "", v8_10);
                }
            }
            String v7_2 = new byte[0];
            return v7_2;
        }
    }

Method in.juspay.godel.util.EncryptionHelper.c() calling method javax.crypto.Cipher.doFinal()


    public byte[] c(byte[] p10, String p11)
    {
        if (!p11.equalsIgnoreCase("v0")) {
            byte[] v1_1 = new byte[8];
            new java.security.SecureRandom().nextBytes(v1_1);
            int v11_5 = p10.length;
            int v2 = (v11_5 + 8);
            byte[] v3 = new byte[v2];
            int v4 = 0;
            int v5 = 0;
            int v6 = 0;
            while ((v4 < v11_5) && (v5 < v2)) {
                if ((v5 <= 0) || (((v5 % 10) != 9) || (v6 >= 8))) {
                    v3[v5] = ((byte) (p10[v4] ^ v1_1[(v4 % 8)]));
                    v4++;
                } else {
                    v3[v5] = v1_1[v6];
                    v6++;
                }
                v5++;
            }
            return v3;
        } else {
            int v11_2 = this.c();
            int v0_2 = javax.crypto.Cipher.getInstance(in.juspay.godel.util.EncryptionHelper.a);
            v0_2.init(1, v11_2);
            return v0_2.doFinal(p10);
        }
    }

Method in.juspay.godel.util.EncryptionHelper.b() calling method javax.crypto.Cipher.doFinal()


    public byte[] b(byte[] p10, String p11)
    {
        try {
            if (!p11.equalsIgnoreCase("v0")) {
                byte[] v1_0 = new byte[8];
                byte[] v2_2 = new byte[(p10.length - 8)];
                int v3 = p10.length;
                int v6 = 0;
                v1_0[0] = p10[9];
                v1_0[1] = p10[19];
                v1_0[2] = p10[29];
                v1_0[3] = p10[39];
                v1_0[4] = p10[49];
                v1_0[5] = p10[59];
                v1_0[6] = p10[69];
                v1_0[7] = p10[79];
                int v0_7 = 0;
                int v5_15 = 0;
                while (v6 < v3) {
                    if ((v6 <= 0) || (((v6 % 10) != 9) || (v0_7 >= 8))) {
                        v2_2[v5_15] = ((byte) (p10[v6] ^ v1_0[(v5_15 % 8)]));
                        v5_15++;
                    } else {
                        v0_7++;
                    }
                    v6++;
                }
                return v2_2;
            } else {
                int v11_3 = this.c();
                byte[] v1_2 = javax.crypto.Cipher.getInstance(in.juspay.godel.util.EncryptionHelper.a);
                v1_2.init(2, v11_3);
                return v1_2.doFinal(p10);
            }
        } catch (byte[] v10_2) {
            in.juspay.godel.util.JuspayLogger.b(in.juspay.godel.util.EncryptionHelper.d, "Decryption Error", v10_2);
            throw new RuntimeException(v10_2);
        }
    }

Method com.userexperior.utilities.c.a() calling method javax.crypto.Cipher.doFinal()


    public static byte[] a(byte[] p2, byte[] p3)
    {
        javax.crypto.spec.SecretKeySpec v0_1 = new javax.crypto.spec.SecretKeySpec(p2, "AES");
        try {
            int v2_9 = javax.crypto.Cipher.getInstance("AES");
            v2_9.init(1, v0_1);
            return v2_9.doFinal(p3);
        } catch (int v2_6) {
            v2_6.printStackTrace();
            return 0;
        } catch (int v2_5) {
            v2_5.printStackTrace();
            return 0;
        } catch (int v2_4) {
            v2_4.printStackTrace();
            return 0;
        } catch (int v2_3) {
            v2_3.printStackTrace();
            return 0;
        } catch (int v2_2) {
            v2_2.printStackTrace();
            return 0;
        } catch (int v2_1) {
            v2_1.printStackTrace();
            return 0;
        }
    }

Method com.userexperior.utilities.c.a() calling method javax.crypto.Cipher.doFinal()


    public static byte[] a(byte[] p4)
    {
        try {
            java.security.PublicKey v1_2 = ark>com.userexperior.utilities.cark>.a(com.userexperior.utilities.i.j(com.userexperior.UserExperior.getUeContext()));
        } catch (int v4_7) {
            v4_7.printStackTrace();
            return 0;
        } catch (int v4_6) {
            v4_6.printStackTrace();
            return 0;
        } catch (int v4_5) {
            v4_5.printStackTrace();
            return 0;
        } catch (int v4_4) {
            v4_4.printStackTrace();
            return 0;
        } catch (int v4_3) {
            v4_3.printStackTrace();
            return 0;
        } catch (int v4_2) {
            v4_2.printStackTrace();
            return 0;
        }
        if (v1_2 != null) {
            javax.crypto.Cipher v2_0 = javax.crypto.Cipher.getInstance("RSA/ECB/PKCS1Padding");
            v2_0.init(1, v1_2);
            return v2_0.doFinal(p4);
        } else {
            return 0;
        }
    }

Method com.razorpay.l__d$.R$$r_() calling method javax.crypto.Cipher.doFinal()


    private String R$$r_(String p6, String p7, com.razorpay.l__d$$a_$P$ p8, String p9)
    {
        String v0_0 = "";
        com.razorpay.l__d$$a_$P$ v1_2 = p7.getBytes("UTF-8").length;
        if (p7.getBytes("UTF-8").length > this.G__G_.length) {
            v1_2 = this.G__G_.length;
        }
        int v2_2 = p9.getBytes("UTF-8").length;
        if (p9.getBytes("UTF-8").length > this.R$$r_.length) {
            v2_2 = this.R$$r_.length;
        }
        System.arraycopy(p7.getBytes("UTF-8"), 0, this.G__G_, 0, v1_2);
        System.arraycopy(p9.getBytes("UTF-8"), 0, this.R$$r_, 0, v2_2);
        javax.crypto.Cipher v7_5 = new javax.crypto.spec.SecretKeySpec(this.G__G_, "AES");
        javax.crypto.spec.IvParameterSpec v9_4 = new javax.crypto.spec.IvParameterSpec(this.R$$r_);
        if (p8.equals(com.razorpay.l__d$$a_$P$.R$$r_)) {
            this.a_$P$.init(1, v7_5, v9_4);
            v0_0 = android.util.Base64.encodeToString(this.a_$P$.doFinal(p6.getBytes("UTF-8")), 2);
        }
        if (p8.equals(com.razorpay.l__d$$a_$P$.G__G_)) {
            this.a_$P$.init(2, v7_5, v9_4);
            v0_0 = new String(this.a_$P$.doFinal(android.util.Base64.decode(p6.getBytes(), 2)));
        }
        return v0_0;
    }

Method com.freshchat.consumer.sdk.b.h.N() calling method javax.crypto.Cipher.doFinal()


    private static String N(String p5)
    {
        if (p5 != 0) {
            if (p5.length() != 0) {
                try {
                    String v0_5 = javax.crypto.Cipher.getInstance("AES", "BC");
                    v0_5.init(2, new javax.crypto.spec.SecretKeySpec(com.freshchat.consumer.sdk.b.h.dR, "AES"));
                    return new String(v0_5.doFinal(com.freshchat.consumer.sdk.b.h.decode(p5)), "UTF-8");
                } catch (int v5_3) {
                    if (com.freshchat.consumer.sdk.b.h.dS) {
                        com.freshchat.consumer.sdk.j.ai.b("FRESHCHAT", "decrypt", v5_3);
                    }
                    p5 = 0;
                }
            } else {
                return p5;
            }
        }
        return p5;
    }

Method com.freshchat.consumer.sdk.b.h.M() calling method javax.crypto.Cipher.doFinal()


    private static String M(String p5)
    {
        if (p5 != 0) {
            if (p5.length() != 0) {
                try {
                    String v0_4 = javax.crypto.Cipher.getInstance("AES", "BC");
                    v0_4.init(1, new javax.crypto.spec.SecretKeySpec(com.freshchat.consumer.sdk.b.h.dR, "AES"));
                    return com.freshchat.consumer.sdk.b.h.a(v0_4.doFinal(p5.getBytes("UTF-8")));
                } catch (int v5_4) {
                    if (com.freshchat.consumer.sdk.b.h.dS) {
                        com.freshchat.consumer.sdk.j.ai.b("FRESHCHAT", "encrypt", v5_4);
                    }
                    p5 = 0;
                }
            } else {
                return p5;
            }
        }
        return p5;
    }

Method com.bharatmatrimony.common.Config.encryptmymobilenumber() calling method javax.crypto.Cipher.doFinal()


    public String encryptmymobilenumber(String p4, String p5)
    {
        String v5_0 = "";
        try {
            int v0_2 = new javax.crypto.spec.SecretKeySpec("iErTmJn14eaRakHi".getBytes(), "AES");
            javax.crypto.Cipher v1_3 = javax.crypto.Cipher.getInstance("AES/ECB/PKCS5Padding");
            v1_3.init(1, v0_2);
            byte[] v4_2 = v1_3.doFinal(p4.getBytes());
        } catch (Exception) {
            v4_2 = 0;
        }
        if (v4_2 != null) {
            v5_0 = new String(android.util.Base64.encode(v4_2, 0));
        }
        return v5_0;
    }

Method com.bharatmatrimony.common.Config.encryptMatriid() calling method javax.crypto.Cipher.doFinal()


    public String encryptMatriid(String p4, String p5)
    {
        String v0_0 = "";
        try {
            javax.crypto.spec.SecretKeySpec v1_1 = new javax.crypto.spec.SecretKeySpec(p5.getBytes(), "AES");
            int v5_4 = javax.crypto.Cipher.getInstance("AES/ECB/PKCS5Padding");
            v5_4.init(1, v1_1);
            byte[] v4_2 = v5_4.doFinal(p4.getBytes());
        } catch (Exception) {
            v4_2 = 0;
        }
        if (v4_2 != null) {
            v0_0 = new String(android.util.Base64.encode(v4_2, 0));
        }
        return v0_0;
    }

Method in.juspay.godel.util.EncryptionHelper.c() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private java.security.Key c()
    {
        return new javax.crypto.spec.SecretKeySpec(in.juspay.godel.util.EncryptionHelper.b, in.juspay.godel.util.EncryptionHelper.a);
    }

Method com.userexperior.utilities.c.a() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public static byte[] a(byte[] p2, byte[] p3)
    {
        javax.crypto.spec.SecretKeySpec v0_1 = new javax.crypto.spec.SecretKeySpec(p2, "AES");
        try {
            int v2_9 = javax.crypto.Cipher.getInstance("AES");
            v2_9.init(1, v0_1);
            return v2_9.doFinal(p3);
        } catch (int v2_6) {
            v2_6.printStackTrace();
            return 0;
        } catch (int v2_5) {
            v2_5.printStackTrace();
            return 0;
        } catch (int v2_4) {
            v2_4.printStackTrace();
            return 0;
        } catch (int v2_3) {
            v2_3.printStackTrace();
            return 0;
        } catch (int v2_2) {
            v2_2.printStackTrace();
            return 0;
        } catch (int v2_1) {
            v2_1.printStackTrace();
            return 0;
        }
    }

Method com.userexperior.utilities.c.a() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public static byte[] a()
    {
        String v3_2 = new StringBuilder();
        v3_2.append("It\'s fine and shine!");
        v3_2.append("fineandshine@userexperior.com");
        v3_2.append("fineandshine@123");
        try {
            int v2_5 = new javax.crypto.spec.SecretKeySpec(java.util.Arrays.copyOf(java.security.MessageDigest.getInstance("SHA-1").digest(v3_2.toString().getBytes()), 16), "AES");
        } catch (byte[] v0_4) {
            v0_4.printStackTrace();
            v2_5 = 0;
        }
        if (v2_5 == 0) {
            return 0;
        } else {
            return v2_5.getEncoded();
        }
    }

Method com.razorpay.l__d$.R$$r_() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private String R$$r_(String p6, String p7, com.razorpay.l__d$$a_$P$ p8, String p9)
    {
        String v0_0 = "";
        com.razorpay.l__d$$a_$P$ v1_2 = p7.getBytes("UTF-8").length;
        if (p7.getBytes("UTF-8").length > this.G__G_.length) {
            v1_2 = this.G__G_.length;
        }
        int v2_2 = p9.getBytes("UTF-8").length;
        if (p9.getBytes("UTF-8").length > this.R$$r_.length) {
            v2_2 = this.R$$r_.length;
        }
        System.arraycopy(p7.getBytes("UTF-8"), 0, this.G__G_, 0, v1_2);
        System.arraycopy(p9.getBytes("UTF-8"), 0, this.R$$r_, 0, v2_2);
        javax.crypto.Cipher v7_5 = new javax.crypto.spec.SecretKeySpec(this.G__G_, "AES");
        javax.crypto.spec.IvParameterSpec v9_4 = new javax.crypto.spec.IvParameterSpec(this.R$$r_);
        if (p8.equals(com.razorpay.l__d$$a_$P$.R$$r_)) {
            this.a_$P$.init(1, v7_5, v9_4);
            v0_0 = android.util.Base64.encodeToString(this.a_$P$.doFinal(p6.getBytes("UTF-8")), 2);
        }
        if (p8.equals(com.razorpay.l__d$$a_$P$.G__G_)) {
            this.a_$P$.init(2, v7_5, v9_4);
            v0_0 = new String(this.a_$P$.doFinal(android.util.Base64.decode(p6.getBytes(), 2)));
        }
        return v0_0;
    }

Method com.freshchat.consumer.sdk.b.h.N() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private static String N(String p5)
    {
        if (p5 != 0) {
            if (p5.length() != 0) {
                try {
                    String v0_5 = javax.crypto.Cipher.getInstance("AES", "BC");
                    v0_5.init(2, new javax.crypto.spec.SecretKeySpec(com.freshchat.consumer.sdk.b.h.dR, "AES"));
                    return new String(v0_5.doFinal(com.freshchat.consumer.sdk.b.h.decode(p5)), "UTF-8");
                } catch (int v5_3) {
                    if (com.freshchat.consumer.sdk.b.h.dS) {
                        com.freshchat.consumer.sdk.j.ai.b("FRESHCHAT", "decrypt", v5_3);
                    }
                    p5 = 0;
                }
            } else {
                return p5;
            }
        }
        return p5;
    }

Method com.freshchat.consumer.sdk.b.h.M() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private static String M(String p5)
    {
        if (p5 != 0) {
            if (p5.length() != 0) {
                try {
                    String v0_4 = javax.crypto.Cipher.getInstance("AES", "BC");
                    v0_4.init(1, new javax.crypto.spec.SecretKeySpec(com.freshchat.consumer.sdk.b.h.dR, "AES"));
                    return com.freshchat.consumer.sdk.b.h.a(v0_4.doFinal(p5.getBytes("UTF-8")));
                } catch (int v5_4) {
                    if (com.freshchat.consumer.sdk.b.h.dS) {
                        com.freshchat.consumer.sdk.j.ai.b("FRESHCHAT", "encrypt", v5_4);
                    }
                    p5 = 0;
                }
            } else {
                return p5;
            }
        }
        return p5;
    }

Method com.bharatmatrimony.common.Config.encryptmymobilenumber() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public String encryptmymobilenumber(String p4, String p5)
    {
        String v5_0 = "";
        try {
            int v0_2 = new javax.crypto.spec.SecretKeySpec("iErTmJn14eaRakHi".getBytes(), "AES");
            javax.crypto.Cipher v1_3 = javax.crypto.Cipher.getInstance("AES/ECB/PKCS5Padding");
            v1_3.init(1, v0_2);
            byte[] v4_2 = v1_3.doFinal(p4.getBytes());
        } catch (Exception) {
            v4_2 = 0;
        }
        if (v4_2 != null) {
            v5_0 = new String(android.util.Base64.encode(v4_2, 0));
        }
        return v5_0;
    }

Method com.bharatmatrimony.common.Config.encryptMatriid() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public String encryptMatriid(String p4, String p5)
    {
        String v0_0 = "";
        try {
            javax.crypto.spec.SecretKeySpec v1_1 = new javax.crypto.spec.SecretKeySpec(p5.getBytes(), "AES");
            int v5_4 = javax.crypto.Cipher.getInstance("AES/ECB/PKCS5Padding");
            v5_4.init(1, v1_1);
            byte[] v4_2 = v5_4.doFinal(p4.getBytes());
        } catch (Exception) {
            v4_2 = 0;
        }
        if (v4_2 != null) {
            v0_0 = new String(android.util.Base64.encode(v4_2, 0));
        }
        return v0_0;
    }