Info Call to Crypto API

Description

List of all calls to cryptographic methods.

Recommendation

Do not use insecure or weak cryptographic algorithms. For example, the Data Encryption Standard (DES) encryption algorithm is considered highly insecure

Do not use Object.equals() to compare cryptographic keys

Cryptographic keys should never be serialized

Technical details

Method com.google.android.exoplayer2.upstream.cache.CachedContentIndex.getCipher() calling method javax.crypto.Cipher.getInstance()

Couldn't retrieve source code

Method com.exoplayer2.upstream.cache.h.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public h(java.io.File p3, byte[] p4, boolean p5)
    {
        this.g = p5;
        String v0_0 = 1;
        if (p4 == null) {
            com.google.android.exoplayer2.util.Assertions.checkState((p5 ^ 1));
            this.e = 0;
            this.f = 0;
        } else {
            if (p4.length != 16) {
                v0_0 = 0;
            }
            com.google.android.exoplayer2.util.Assertions.checkArgument(v0_0);
            try {
                this.e = com.exoplayer2.upstream.cache.h.g();
                this.f = new javax.crypto.spec.SecretKeySpec(p4, "AES");
            } catch (java.security.NoSuchAlgorithmException v3_1) {
                throw new IllegalStateException(v3_1);
            }
        }
        this.a = new java.util.HashMap();
        this.b = new android.util.SparseArray();
        this.c = new android.util.SparseBooleanArray();
        this.d = new com.google.android.exoplayer2.util.AtomicFile(new java.io.File(p3, "cached_content_index.exi"));
        return;
    }

Method com.utilities.Util.a() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public static String a(String p2, String p3)
    {
        try {
            String v0_2 = new javax.crypto.spec.SecretKeySpec(p3.getBytes(), "HmacMD5");
            RuntimeException v3_7 = javax.crypto.Mac.getInstance("HmacMD5");
            v3_7.init(v0_2);
            return new String(ark>com.utilities.Utilark>.a(v3_7.doFinal(p2.getBytes())), "UTF-8");
        } catch (int v2_8) {
            throw new RuntimeException(v2_8);
        } catch (int v2_6) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v2_6);
            return 0;
        } catch (int v2_5) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v2_5);
            return 0;
        } catch (int v2_4) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v2_4);
            return 0;
        }
    }

Method com.exoplayer2.upstream.EncryptedFileDataSource2.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public EncryptedFileDataSource2()
    {
        super(0);
        try {
            super.g = javax.crypto.Cipher.getInstance(com.gaana.application.GaanaApplication.getEncryptionKey(2));
            super.a = new javax.crypto.spec.SecretKeySpec(new StringBuilder(com.gaana.application.GaanaApplication.getEncryptionKey(0)).reverse().toString().getBytes(), "AES");
            super.b = new javax.crypto.spec.IvParameterSpec(new StringBuilder(com.gaana.application.GaanaApplication.getEncryptionKey(1)).reverse().toString().getBytes());
            super.g.init(2, super.a, super.b);
        } catch (java.security.InvalidKeyException v0_11) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v0_11);
        } catch (java.security.InvalidKeyException v0_10) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v0_10);
        } catch (java.security.InvalidKeyException v0_9) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v0_9);
        } catch (java.security.InvalidKeyException v0_8) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v0_8);
        }
        return;
    }

Method com.google.ads.interactivemedia.v3.internal.kf.a() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public byte[] a(byte[] p5, String p6)
    {
        if (p5.length == 16) {
            try {
                byte[] v6_16 = this.a.a(p6, 0);
            } catch (byte[] v5_12) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_12);
            } catch (byte[] v5_11) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_11);
            } catch (byte[] v5_10) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_10);
            } catch (byte[] v5_9) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_9);
            } catch (byte[] v5_8) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_8);
            } catch (byte[] v5_7) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_7);
            } catch (byte[] v5_6) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_6);
            }
            if (v6_16.length > 16) {
                int v1_1 = java.nio.ByteBuffer.allocate(v6_16.length);
                v1_1.put(v6_16);
                v1_1.flip();
                byte[] v2_0 = new byte[16];
                byte[] v6_3 = new byte[(v6_16.length - 16)];
                v1_1.get(v2_0);
                v1_1.get(v6_3);
                javax.crypto.spec.SecretKeySpec v0_2 = new javax.crypto.spec.SecretKeySpec(p5, "AES");
                byte[] v5_2 = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5Padding");
                v5_2.init(2, v0_2, new javax.crypto.spec.IvParameterSpec(v2_0));
                return v5_2.doFinal(v6_3);
            } else {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this);
            }
        } else {
            throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this);
        }
    }

Method com.google.android.exoplayer2.upstream.cache.CachedContentIndex.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public CachedContentIndex(java.io.File p3, byte[] p4, boolean p5)
    {
        this.encrypt = p5;
        String v0_0 = 1;
        if (p4 == null) {
            com.google.android.exoplayer2.util.Assertions.checkState((p5 ^ 1));
            this.cipher = 0;
            this.secretKeySpec = 0;
        } else {
            if (p4.length != 16) {
                v0_0 = 0;
            }
            com.google.android.exoplayer2.util.Assertions.checkArgument(v0_0);
            try {
                this.cipher = com.google.android.exoplayer2.upstream.cache.CachedContentIndex.getCipher();
                this.secretKeySpec = new javax.crypto.spec.SecretKeySpec(p4, "AES");
            } catch (java.security.NoSuchAlgorithmException v3_1) {
                throw new IllegalStateException(v3_1);
            }
        }
        this.keyToContent = new java.util.HashMap();
        this.idToKey = new android.util.SparseArray();
        this.removedIds = new android.util.SparseBooleanArray();
        this.atomicFile = new com.google.android.exoplayer2.util.AtomicFile(new java.io.File(p3, "cached_content_index.exi"));
        return;
    }

Method com.google.android.exoplayer2.upstream.crypto.AesFlushingCipher.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public AesFlushingCipher(int p6, byte[] p7, long p8, long p10)
    {
        try {
            this.cipher = javax.crypto.Cipher.getInstance("AES/CTR/NoPadding");
            this.blockSize = this.cipher.getBlockSize();
            long v0_1 = new byte[this.blockSize];
            this.zerosBlock = v0_1;
            long v0_3 = new byte[this.blockSize];
            this.flushedBlock = v0_3;
            int v10_2 = ((int) (p10 % ((long) this.blockSize)));
            this.cipher.init(p6, new javax.crypto.spec.SecretKeySpec(p7, com.google.android.exoplayer2.util.Util.splitAtFirst(this.cipher.getAlgorithm(), "/")[0]), new javax.crypto.spec.IvParameterSpec(this.getInitializationVector(p8, (p10 / ((long) this.blockSize)))));
        } catch (byte[] v6_2) {
            throw new RuntimeException(v6_2);
        }
        if (v10_2 != 0) {
            byte[] v6_1 = new byte[v10_2];
            this.updateInPlace(v6_1, 0, v10_2);
        }
        return;
    }

Method com.google.android.gms.internal.ads.zzboe.zza() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public final com.google.android.gms.internal.ads.zzbof zza(String p11, byte[] p12, byte[] p13, int p14, com.google.android.gms.internal.ads.zzboj p15)
    {
        javax.crypto.Mac v0_6 = com.google.android.gms.internal.ads.zzbog.zza(this.zzfja.getParams());
        int v1_18 = ((java.security.interfaces.ECPublicKey) v0_6.getPublic());
        javax.crypto.Mac v0_1 = ((java.security.interfaces.ECPrivateKey) v0_6.getPrivate());
        int v2_0 = this.zzfja;
        try {
            int v3_1 = v2_0.getParams();
            int v4_0 = v0_1.getParams();
        } catch (com.google.android.gms.internal.ads.zzbof v11_11) {
            throw new java.security.GeneralSecurityException(v11_11.toString());
        }
        if ((v3_1.getCurve().equals(v4_0.getCurve())) && ((v3_1.getGenerator().equals(v4_0.getGenerator())) && ((v3_1.getOrder().equals(v4_0.getOrder())) && (v3_1.getCofactor() == v4_0.getCofactor())))) {
            int v3_0;
            javax.crypto.Mac v0_7 = com.google.android.gms.internal.ads.zzbog.zza(v0_1, v2_0.getW());
            int v2_7 = v1_18.getParams().getCurve();
            int v1_16 = v1_18.getW();
            com.google.android.gms.internal.ads.zzbog.zza(v1_16, v2_7);
            int v2_8 = com.google.android.gms.internal.ads.zzbog.zzb(v2_7);
            int v5_1 = 1;
            switch (com.google.android.gms.internal.ads.zzboh.zzfjd[p15.ordinal()]) {
                case 1:
                    byte[] v15_5 = ((2 * v2_8) + 1);
                    v3_0 = new byte[v15_5];
                    byte[] v7_1 = v1_16.getAffineX().toByteArray();
                    int v1_2 = v1_16.getAffineY().toByteArray();
                    System.arraycopy(v1_2, 0, v3_0, (v15_5 - v1_2.length), v1_2.length);
                    System.arraycopy(v7_1, 0, v3_0, ((v2_8 + 1) - v7_1.length), v7_1.length);
                    v3_0[0] = 4;
                    break;
                case 2:
                    byte[] v15_14 = (2 * v2_8);
                    v3_0 = new byte[v15_14];
                    byte[] v7_5 = v1_16.getAffineX().toByteArray();
                    if (v7_5.length > v2_8) {
                        v7_5 = java.util.Arrays.copyOfRange(v7_5, (v7_5.length - v2_8), v7_5.length);
                    }
                    int v1_0 = v1_16.getAffineY().toByteArray();
                    if (v1_0.length > v2_8) {
                        v1_0 = java.util.Arrays.copyOfRange(v1_0, (v1_0.length - v2_8), v1_0.length);
                    }
                    System.arraycopy(v1_0, 0, v3_0, (v15_14 - v1_0.length), v1_0.length);
                    System.arraycopy(v7_5, 0, v3_0, (v2_8 - v7_5.length), v7_5.length);
                    break;
                case 3:
                    int v1_21;
                    int v2_9 = (v2_8 + 1);
                    byte[] v15_13 = new byte[v2_9];
                    int v3_6 = v1_16.getAffineX().toByteArray();
                    System.arraycopy(v3_6, 0, v15_13, (v2_9 - v3_6.length), v3_6.length);
                    if (!v1_16.getAffineY().testBit(0)) {
                        v1_21 = 2;
                    } else {
                        v1_21 = 3;
                    }
                    v15_13[0] = ((byte) v1_21);
                    v3_0 = v15_13;
                    break;
                default:
                    int v12_6 = String.valueOf(p15);
                    int v14_5 = new StringBuilder((15 + String.valueOf(v12_6).length()));
                    v14_5.append("invalid format:");
                    v14_5.append(v12_6);
                    throw new java.security.GeneralSecurityException(v14_5.toString());
            }
            byte[] v15_10 = new byte[][2];
            v15_10[0] = v3_0;
            v15_10[1] = v0_7;
            byte[] v15_11 = com.google.android.gms.internal.ads.zzbnx.zza(v15_10);
            javax.crypto.Mac v0_4 = ((javax.crypto.Mac) com.google.android.gms.internal.ads.zzbol.zzfjs.zzfu(p11));
            if (p14 <= (255 * v0_4.getMacLength())) {
                if ((p12 != 0) && (p12.length != 0)) {
                    v0_4.init(new javax.crypto.spec.SecretKeySpec(p12, p11));
                } else {
                    int v1_9 = new byte[v0_4.getMacLength()];
                    v0_4.init(new javax.crypto.spec.SecretKeySpec(v1_9, p11));
                }
                byte[] v15_12 = new byte[p14];
                v0_4.init(new javax.crypto.spec.SecretKeySpec(v0_4.doFinal(v15_11), p11));
                com.google.android.gms.internal.ads.zzbof v11_1 = new byte[0];
                int v12_4 = 0;
                while(true) {
                    v0_4.update(v11_1);
                    v0_4.update(p13);
                    v0_4.update(((byte) v5_1));
                    v11_1 = v0_4.doFinal();
                    if ((v11_1.length + v12_4) >= p14) {
                        break;
                    }
                    System.arraycopy(v11_1, 0, v15_12, v12_4, v11_1.length);
                    v12_4 += v11_1.length;
                    v5_1++;
                }
                System.arraycopy(v11_1, 0, v15_12, v12_4, (p14 - v12_4));
                return new com.google.android.gms.internal.ads.zzbof(v3_0, v15_12);
            } else {
                throw new java.security.GeneralSecurityException("size too large");
            }
        } else {
            throw new java.security.GeneralSecurityException("invalid public key spec");
        }
    }

Method com.google.android.gms.internal.ads.zzcw.zza() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public final byte[] zza(byte[] p6, String p7)
    {
        if (p6.length == 16) {
            try {
                Throwable v7_12 = com.google.android.gms.internal.ads.zzbu.zza(p7, 0);
            } catch (Object v6_9) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_9);
            } catch (Object v6_8) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_8);
            } catch (Object v6_7) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_7);
            } catch (Object v6_6) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_6);
            } catch (Object v6_5) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_5);
            } catch (Object v6_4) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_4);
            } catch (Object v6_3) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_3);
            }
            if (v7_12.length > 16) {
                javax.crypto.Cipher v1_1 = java.nio.ByteBuffer.allocate(v7_12.length);
                v1_1.put(v7_12);
                v1_1.flip();
                byte[] v2 = new byte[16];
                Throwable v7_3 = new byte[(v7_12.length - 16)];
                v1_1.get(v2);
                v1_1.get(v7_3);
                com.google.android.gms.internal.ads.zzcw.getCipher().init(2, new javax.crypto.spec.SecretKeySpec(p6, "AES"), new javax.crypto.spec.IvParameterSpec(v2));
                return com.google.android.gms.internal.ads.zzcw.getCipher().doFinal(v7_3);
            } else {
                throw new com.google.android.gms.internal.ads.zzcx(this);
            }
        } else {
            throw new com.google.android.gms.internal.ads.zzcx(this);
        }
    }

Method com.google.android.gms.internal.ads.zzcw.zzb() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public final String zzb(byte[] p5, byte[] p6)
    {
        if (p5.length == 16) {
            try {
            } catch (String v5_9) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_9);
            } catch (String v5_8) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_8);
            } catch (String v5_7) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_7);
            } catch (String v5_6) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_6);
            } catch (String v5_5) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_5);
            }
            com.google.android.gms.internal.ads.zzcw.getCipher().init(1, new javax.crypto.spec.SecretKeySpec(p5, "AES"), 0);
            int v6_1 = com.google.android.gms.internal.ads.zzcw.getCipher().doFinal(p6);
            java.nio.ByteBuffer v0_3 = com.google.android.gms.internal.ads.zzcw.getCipher().getIV();
            String v5_2 = (v6_1.length + v0_3.length);
            java.nio.ByteBuffer v1_2 = java.nio.ByteBuffer.allocate(v5_2);
            v1_2.put(v0_3).put(v6_1);
            v1_2.flip();
            String v5_3 = new byte[v5_2];
            v1_2.get(v5_3);
            return com.google.android.gms.internal.ads.zzbu.zza(v5_3, 0);
        } else {
            throw new com.google.android.gms.internal.ads.zzcx(this);
        }
    }

Method com.google.android.exoplayer2.source.hls.Aes128DataSource.open() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public final long open(com.google.android.exoplayer2.upstream.DataSpec p5)
    {
        try {
            RuntimeException v0_0 = this.getCipherInstance();
            try {
                v0_0.init(2, new javax.crypto.spec.SecretKeySpec(this.encryptionKey, "AES"), new javax.crypto.spec.IvParameterSpec(this.encryptionIv));
                com.google.android.exoplayer2.upstream.DataSourceInputStream v1_1 = new com.google.android.exoplayer2.upstream.DataSourceInputStream(this.upstream, p5);
                this.cipherInputStream = new javax.crypto.CipherInputStream(v1_1, v0_0);
                v1_1.open();
                return -1;
            } catch (java.security.InvalidKeyException v5_4) {
                throw new RuntimeException(v5_4);
            }
        } catch (java.security.InvalidKeyException v5_1) {
            throw new RuntimeException(v5_1);
        }
        v0_0.init(2, new javax.crypto.spec.SecretKeySpec(this.encryptionKey, "AES"), new javax.crypto.spec.IvParameterSpec(this.encryptionIv));
        v1_1 = new com.google.android.exoplayer2.upstream.DataSourceInputStream(this.upstream, p5);
        this.cipherInputStream = new javax.crypto.CipherInputStream(v1_1, v0_0);
        v1_1.open();
        return -1;
    }

Method com.google.android.gms.internal.ads.zzbkx.zzh() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private final com.google.android.gms.internal.ads.zzbjx zzh(com.google.android.gms.internal.ads.zzbpu p5)
    {
        try {
            java.security.GeneralSecurityException v5_1 = com.google.android.gms.internal.ads.zzbmp.zzae(p5);
        } catch (java.security.GeneralSecurityException v5_11) {
            throw new java.security.GeneralSecurityException("expected serialized HmacKey proto", v5_11);
        }
        if ((v5_1 instanceof com.google.android.gms.internal.ads.zzbmp)) {
            java.security.GeneralSecurityException v5_4 = ((com.google.android.gms.internal.ads.zzbmp) v5_1);
            com.google.android.gms.internal.ads.zzbpd.zzs(v5_4.getVersion(), 0);
            if (v5_4.zzagf().size() >= 16) {
                com.google.android.gms.internal.ads.zzbjx v0_9;
                com.google.android.gms.internal.ads.zzbkx.zza(v5_4.zzahw());
                com.google.android.gms.internal.ads.zzbjx v0_5 = v5_4.zzahw().zzaic();
                javax.crypto.spec.SecretKeySpec v2_1 = new javax.crypto.spec.SecretKeySpec(v5_4.zzagf().toByteArray(), "HMAC");
                java.security.GeneralSecurityException v5_3 = v5_4.zzahw().zzaid();
                switch (com.google.android.gms.internal.ads.zzbky.zzfds[v0_5.ordinal()]) {
                    case 1:
                        v0_9 = new com.google.android.gms.internal.ads.zzbow("HMACSHA1", v2_1, v5_3);
                        break;
                    case 2:
                        v0_9 = new com.google.android.gms.internal.ads.zzbow("HMACSHA256", v2_1, v5_3);
                        break;
                    case 3:
                        v0_9 = new com.google.android.gms.internal.ads.zzbow("HMACSHA512", v2_1, v5_3);
                        break;
                    default:
                        throw new java.security.GeneralSecurityException("unknown hash");
                }
                return ((com.google.android.gms.internal.ads.zzbjx) v0_9);
            } else {
                throw new java.security.GeneralSecurityException("key too short");
            }
        } else {
            throw new java.security.GeneralSecurityException("expected HmacKey proto");
        }
    }

Method com.google.android.gms.internal.ads.zzbkx.zza() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public final synthetic Object zza(com.google.android.gms.internal.ads.zzbsl p5)
    {
        if ((p5 instanceof com.google.android.gms.internal.ads.zzbmp)) {
            com.google.android.gms.internal.ads.zzbpd.zzs(((com.google.android.gms.internal.ads.zzbmp) p5).getVersion(), 0);
            if (((com.google.android.gms.internal.ads.zzbmp) p5).zzagf().size() >= 16) {
                com.google.android.gms.internal.ads.zzbkx.zza(((com.google.android.gms.internal.ads.zzbmp) p5).zzahw());
                com.google.android.gms.internal.ads.zzbow v0_4 = ((com.google.android.gms.internal.ads.zzbmp) p5).zzahw().zzaic();
                javax.crypto.spec.SecretKeySpec v2_1 = new javax.crypto.spec.SecretKeySpec(((com.google.android.gms.internal.ads.zzbmp) p5).zzagf().toByteArray(), "HMAC");
                java.security.GeneralSecurityException v5_3 = ((com.google.android.gms.internal.ads.zzbmp) p5).zzahw().zzaid();
                switch (com.google.android.gms.internal.ads.zzbky.zzfds[v0_4.ordinal()]) {
                    case 1:
                        return new com.google.android.gms.internal.ads.zzbow("HMACSHA1", v2_1, v5_3);
                    case 2:
                        return new com.google.android.gms.internal.ads.zzbow("HMACSHA256", v2_1, v5_3);
                    case 3:
                        return new com.google.android.gms.internal.ads.zzbow("HMACSHA512", v2_1, v5_3);
                    default:
                        throw new java.security.GeneralSecurityException("unknown hash");
                }
            } else {
                throw new java.security.GeneralSecurityException("key too short");
            }
        } else {
            throw new java.security.GeneralSecurityException("expected HmacKey proto");
        }
    }

Method com.google.android.gms.internal.ads.zzbnu.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public zzbnu(byte[] p4, int p5)
    {
        com.google.android.gms.internal.ads.zzbpd.zzeh(p4.length);
        this.zzfil = new javax.crypto.spec.SecretKeySpec(p4, "AES");
        this.zzfin = ((javax.crypto.Cipher) com.google.android.gms.internal.ads.zzbol.zzfjr.zzfu("AES/CTR/NoPadding")).getBlockSize();
        if ((p5 >= 12) && (p5 <= this.zzfin)) {
            this.zzfim = p5;
            return;
        } else {
            throw new java.security.GeneralSecurityException("invalid IV size");
        }
    }

Method com.google.android.gms.internal.ads.zzbnv.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public zzbnv(byte[] p3, int p4)
    {
        if ((p4 == 12) || (p4 == 16)) {
            this.zzfiq = p4;
            com.google.android.gms.internal.ads.zzbpd.zzeh(p3.length);
            this.zzfil = new javax.crypto.spec.SecretKeySpec(p3, "AES");
            IllegalArgumentException v3_2 = javax.crypto.Cipher.getInstance("AES/ECB/NOPADDING");
            v3_2.init(1, this.zzfil);
            String v4_3 = new byte[16];
            this.zzfio = com.google.android.gms.internal.ads.zzbnv.zzo(v3_2.doFinal(v4_3));
            this.zzfip = com.google.android.gms.internal.ads.zzbnv.zzo(this.zzfio);
            return;
        } else {
            throw new IllegalArgumentException("IV size should be either 12 or 16 bytes");
        }
    }

Method com.google.android.gms.internal.ads.zzbnw.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public zzbnw(byte[] p3)
    {
        com.google.android.gms.internal.ads.zzbpd.zzeh(p3.length);
        this.zzfir = new javax.crypto.spec.SecretKeySpec(p3, "AES");
        return;
    }

Method com.google.api.client.auth.oauth.OAuthHmacSigner.computeSignature() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public String computeSignature(String p4)
    {
        javax.crypto.Mac v0_1 = new StringBuilder();
        javax.crypto.spec.SecretKeySpec v1_2 = this.clientSharedSecret;
        if (v1_2 != null) {
            v0_1.append(com.google.api.client.auth.oauth.OAuthParameters.escape(v1_2));
        }
        v0_1.append(38);
        javax.crypto.spec.SecretKeySpec v1_6 = this.tokenSharedSecret;
        if (v1_6 != null) {
            v0_1.append(com.google.api.client.auth.oauth.OAuthParameters.escape(v1_6));
        }
        javax.crypto.spec.SecretKeySpec v1_3 = new javax.crypto.spec.SecretKeySpec(com.google.api.client.util.StringUtils.getBytesUtf8(v0_1.toString()), "HmacSHA1");
        javax.crypto.Mac v0_5 = javax.crypto.Mac.getInstance("HmacSHA1");
        v0_5.init(v1_3);
        return com.google.api.client.util.Base64.encodeBase64String(v0_5.doFinal(com.google.api.client.util.StringUtils.getBytesUtf8(p4)));
    }

Method com.helpshift.e.a.a() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private String a(String p6, String p7, int p8)
    {
        if (p8 <= 1) {
            try {
                Exception v1_6 = new javax.crypto.spec.SecretKeySpec(p7.getBytes("UTF-8"), "HmacSHA256");
                String v2_0 = javax.crypto.Mac.getInstance("HmacSHA256");
                v2_0.init(v1_6);
                return this.a(v2_0.doFinal(p6.getBytes("UTF-8")));
            } catch (Exception v1_5) {
                if (p8 != 1) {
                    String v3_1 = new StringBuilder();
                    v3_1.append("Could not generate mac signature: ");
                    v3_1.append(v1_5.getLocalizedMessage());
                    v3_1.append(", retryCount: ");
                    v3_1.append(p8);
                    com.helpshift.util.l.c("Helpshift_CryptoDM", v3_1.toString(), v1_5);
                } else {
                    String v3_4 = new StringBuilder();
                    v3_4.append("Could not generate mac signature: ");
                    v3_4.append(v1_5.getLocalizedMessage());
                    v3_4.append(", retryCount: ");
                    v3_4.append(p8);
                    String v4_7 = new com.helpshift.j.c.a[0];
                    com.helpshift.util.l.d("Helpshift_CryptoDM", v3_4.toString(), v1_5, v4_7);
                }
                return this.a(p6, p7, (p8 + 1));
            }
        } else {
            return 0;
        }
    }

Method com.inmobi.commons.core.utilities.a.b.a() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public static byte[] a(byte[] p3, byte[] p4, byte[] p5)
    {
        javax.crypto.spec.SecretKeySpec v0_1 = new javax.crypto.spec.SecretKeySpec(p4, ark>com.inmobi.commons.core.utilities.a.bark>.b);
        try {
            StringBuilder v4_4 = javax.crypto.Cipher.getInstance(ark>com.inmobi.commons.core.utilities.a.bark>.c);
            v4_4.init(2, v0_1, new javax.crypto.spec.IvParameterSpec(p5));
            int v3_1 = v4_4.doFinal(p3);
        } catch (int v3_2) {
            new StringBuilder("SDK encountered unexpected error in decrypting AES response; ").append(v3_2.getMessage());
            v3_1 = 0;
        }
        return v3_1;
    }

Method com.inmobi.commons.core.utilities.a.b.b() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private static byte[] b(byte[] p4, byte[] p5)
    {
        javax.crypto.spec.SecretKeySpec v0_1 = new javax.crypto.spec.SecretKeySpec(p5, 0, p5.length, "HmacSHA1");
        try {
            javax.crypto.Mac v5_2 = javax.crypto.Mac.getInstance("HmacSHA1");
            v5_2.init(v0_1);
            int v4_1 = v5_2.doFinal(p4);
        } catch (java.security.NoSuchAlgorithmException) {
            v4_1 = 0;
        }
        return v4_1;
    }

Method com.inmobi.commons.core.utilities.a.b.b() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private static byte[] b(byte[] p2, byte[] p3, byte[] p4)
    {
        javax.crypto.spec.SecretKeySpec v0_1 = new javax.crypto.spec.SecretKeySpec(p3, com.inmobi.commons.core.utilities.a.b.b);
        StringBuilder v3_4 = new javax.crypto.spec.IvParameterSpec(p4);
        try {
            String v4_3 = javax.crypto.Cipher.getInstance(com.inmobi.commons.core.utilities.a.b.c);
            v4_3.init(1, v0_1, v3_4);
            v4_3.init(1, v0_1, v3_4);
            v4_3.init(1, v0_1, v3_4);
            int v2_1 = v4_3.doFinal(p2);
        } catch (int v2_2) {
            new StringBuilder("SDK encountered unexpected error in getting encrypted AES bytes; ").append(v2_2.getMessage());
            v2_1 = 0;
        }
        return v2_1;
    }

Method com.utilities.i.a() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public static java.io.OutputStream a(java.io.OutputStream p6)
    {
        try {
            javax.crypto.Cipher v0_2 = javax.crypto.Cipher.getInstance(com.gaana.application.GaanaApplication.getEncryptionKey(2));
            v0_2.init(1, new javax.crypto.spec.SecretKeySpec(new StringBuilder(com.gaana.application.GaanaApplication.getEncryptionKey(0)).reverse().toString().getBytes(), "AES"), new javax.crypto.spec.IvParameterSpec(new StringBuilder(com.gaana.application.GaanaApplication.getEncryptionKey(1)).reverse().toString().getBytes()));
            return new javax.crypto.CipherOutputStream(p6, v0_2);
        } catch (int v6_4) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v6_4);
            return 0;
        } catch (int v6_3) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v6_3);
            return 0;
        } catch (int v6_2) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v6_2);
            return 0;
        } catch (int v6_1) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v6_1);
            return 0;
        }
    }

Method com.utilities.k.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public k(String p3)
    {
        this.b = new javax.crypto.spec.SecretKeySpec(p3.getBytes(), "AES");
        try {
            this.c = javax.crypto.Cipher.getInstance("AES/ECB/NoPadding");
        } catch (javax.crypto.NoSuchPaddingException v3_2) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v3_2);
        } catch (javax.crypto.NoSuchPaddingException v3_1) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v3_1);
        }
        return;
    }

Method com.utilities.k.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public k(String p2, String p3)
    {
        this.a = new javax.crypto.spec.IvParameterSpec(p3.getBytes());
        this.b = new javax.crypto.spec.SecretKeySpec(p2.getBytes(), "AES");
        try {
            this.c = javax.crypto.Cipher.getInstance("AES/CBC/NoPadding");
        } catch (javax.crypto.NoSuchPaddingException v2_4) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v2_4);
        } catch (javax.crypto.NoSuchPaddingException v2_3) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v2_3);
        }
        return;
    }

Method com.timespointssdk.g.d() calling method javax.crypto.spec.SecretKeySpec.<init>()


    protected static String d(String p25)
    {
        long v14_1 = Long.valueOf(Long.parseLong("057050102050056053"));
        java.security.NoSuchAlgorithmException v1_14 = Long.valueOf(Long.parseLong("0530051114627"));
        RuntimeException v2_10 = Long.valueOf(Long.parseLong("052054048097057"));
        String v3_7 = Long.valueOf(Long.parseLong("102100841712618615"));
        String v4_9 = Long.valueOf(Long.parseLong("107105054050100"));
        int v5_8 = Long.valueOf(Long.parseLong("101163369664947316"));
        StringBuilder v6_7 = Long.valueOf(Long.parseLong("056048056049048053"));
        StringBuilder v7_7 = Long.valueOf(Long.parseLong("115857683891753071"));
        int v8_6 = Long.valueOf(Long.parseLong("051048050053097099"));
        long v9_2 = Long.valueOf(Long.parseLong("051077257571527366"));
        java.security.NoSuchAlgorithmException v1_15 = Long.valueOf((v14_1.longValue() ^ v1_14.longValue()));
        RuntimeException v2_12 = Long.valueOf((v2_10.longValue() ^ v3_7.longValue()));
        String v3_9 = Long.valueOf((v4_9.longValue() ^ v5_8.longValue()));
        String v4_11 = Long.valueOf((v6_7.longValue() ^ v7_7.longValue()));
        int v5_0 = Long.valueOf((v8_6.longValue() ^ v9_2.longValue()));
        StringBuilder v6_2 = Long.valueOf((Long.valueOf(Long.parseLong("102049056100051053")).longValue() ^ Long.valueOf(Long.parseLong("102102944105832510")).longValue()));
        StringBuilder v7_2 = new StringBuilder();
        v7_2.append("057050102050056053");
        v7_2.append("0");
        v7_2.append(v1_15);
        v7_2.append("052054048097057");
        v7_2.append(v2_12);
        v7_2.append("107105054050100");
        v7_2.append(v3_9);
        v7_2.append("056048056049048053");
        v7_2.append("0");
        v7_2.append(v4_11);
        v7_2.append("051048050053097099");
        v7_2.append("0");
        v7_2.append(v5_0);
        v7_2.append("102049056100051053");
        v7_2.append("0");
        v7_2.append(v6_2);
        String v3_0 = new String[68];
        int v5_1 = new StringBuilder(v7_2.toString());
        String v4_2 = 0;
        while (v4_2 < 68) {
            v3_0[v4_2] = v5_1.substring(0, 3);
            v4_2++;
            v5_1 = new StringBuilder(v5_1.subSequence(3, v5_1.length()));
        }
        RuntimeException v2_2 = 0;
        String v4_3 = "";
        while (v2_2 < v3_0.length) {
            int v5_4 = Integer.parseInt(v3_0[v2_2]);
            StringBuilder v6_4 = new StringBuilder();
            v6_4.append(v4_3);
            v6_4.append(Character.valueOf(((char) v5_4)));
            v4_3 = v6_4.toString();
            v2_2++;
        }
        RuntimeException v2_4 = new javax.crypto.spec.SecretKeySpec(v4_3.getBytes(), "HmacSHA256");
        try {
            String v3_3 = javax.crypto.Mac.getInstance("HmacSHA256");
            v3_3.init(v2_4);
            return android.util.Base64.encodeToString(v3_3.doFinal(p25.getBytes()), 0);
        } catch (java.security.NoSuchAlgorithmException v0) {
            throw new RuntimeException("Exception hashing payload", v0);
        }
    }

Method com.comscore.utils.Utils.encrypt() calling method javax.crypto.Cipher.doFinal()


    public static String encrypt(String p4)
    {
        Class v0_6 = java.security.KeyFactory.getInstance("RSA").generatePublic(new java.security.spec.X509EncodedKeySpec(com.comscore.utils.Constants.RSA_PUBLIC_KEY));
        String v1_1 = javax.crypto.Cipher.getInstance("RSA/ECB/PKCS1PADDING");
        v1_1.init(1, v0_6);
        String v1_3 = new String(com.comscore.utils.Base64Coder.encode(v1_1.doFinal(p4.getBytes())));
        StringBuilder v2_2 = new StringBuilder();
        v2_2.append("encrypt(");
        v2_2.append(p4);
        v2_2.append(")=");
        v2_2.append(v1_3);
        com.comscore.utils.CSLog.d(com.comscore.utils.Utils, v2_2.toString());
        return v1_3;
    }

Method com.google.ads.interactivemedia.v3.internal.kf.a() calling method javax.crypto.Cipher.doFinal()


    public byte[] a(byte[] p5, String p6)
    {
        if (p5.length == 16) {
            try {
                byte[] v6_16 = this.a.a(p6, 0);
            } catch (byte[] v5_12) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_12);
            } catch (byte[] v5_11) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_11);
            } catch (byte[] v5_10) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_10);
            } catch (byte[] v5_9) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_9);
            } catch (byte[] v5_8) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_8);
            } catch (byte[] v5_7) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_7);
            } catch (byte[] v5_6) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_6);
            }
            if (v6_16.length > 16) {
                int v1_1 = java.nio.ByteBuffer.allocate(v6_16.length);
                v1_1.put(v6_16);
                v1_1.flip();
                byte[] v2_0 = new byte[16];
                byte[] v6_3 = new byte[(v6_16.length - 16)];
                v1_1.get(v2_0);
                v1_1.get(v6_3);
                javax.crypto.spec.SecretKeySpec v0_2 = new javax.crypto.spec.SecretKeySpec(p5, "AES");
                byte[] v5_2 = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5Padding");
                v5_2.init(2, v0_2, new javax.crypto.spec.IvParameterSpec(v2_0));
                return v5_2.doFinal(v6_3);
            } else {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this);
            }
        } else {
            throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this);
        }
    }

Method com.google.android.gms.internal.ads.zzcw.zza() calling method javax.crypto.Cipher.doFinal()


    public final byte[] zza(byte[] p6, String p7)
    {
        if (p6.length == 16) {
            try {
                Throwable v7_12 = com.google.android.gms.internal.ads.zzbu.zza(p7, 0);
            } catch (Object v6_9) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_9);
            } catch (Object v6_8) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_8);
            } catch (Object v6_7) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_7);
            } catch (Object v6_6) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_6);
            } catch (Object v6_5) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_5);
            } catch (Object v6_4) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_4);
            } catch (Object v6_3) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_3);
            }
            if (v7_12.length > 16) {
                javax.crypto.Cipher v1_1 = java.nio.ByteBuffer.allocate(v7_12.length);
                v1_1.put(v7_12);
                v1_1.flip();
                byte[] v2 = new byte[16];
                Throwable v7_3 = new byte[(v7_12.length - 16)];
                v1_1.get(v2);
                v1_1.get(v7_3);
                com.google.android.gms.internal.ads.zzcw.getCipher().init(2, new javax.crypto.spec.SecretKeySpec(p6, "AES"), new javax.crypto.spec.IvParameterSpec(v2));
                return com.google.android.gms.internal.ads.zzcw.getCipher().doFinal(v7_3);
            } else {
                throw new com.google.android.gms.internal.ads.zzcx(this);
            }
        } else {
            throw new com.google.android.gms.internal.ads.zzcx(this);
        }
    }

Method com.google.android.gms.internal.ads.zzcw.zzb() calling method javax.crypto.Cipher.doFinal()


    public final String zzb(byte[] p5, byte[] p6)
    {
        if (p5.length == 16) {
            try {
            } catch (String v5_9) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_9);
            } catch (String v5_8) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_8);
            } catch (String v5_7) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_7);
            } catch (String v5_6) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_6);
            } catch (String v5_5) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_5);
            }
            com.google.android.gms.internal.ads.zzcw.getCipher().init(1, new javax.crypto.spec.SecretKeySpec(p5, "AES"), 0);
            int v6_1 = com.google.android.gms.internal.ads.zzcw.getCipher().doFinal(p6);
            java.nio.ByteBuffer v0_3 = com.google.android.gms.internal.ads.zzcw.getCipher().getIV();
            String v5_2 = (v6_1.length + v0_3.length);
            java.nio.ByteBuffer v1_2 = java.nio.ByteBuffer.allocate(v5_2);
            v1_2.put(v0_3).put(v6_1);
            v1_2.flip();
            String v5_3 = new byte[v5_2];
            v1_2.get(v5_3);
            return com.google.android.gms.internal.ads.zzbu.zza(v5_3, 0);
        } else {
            throw new com.google.android.gms.internal.ads.zzcx(this);
        }
    }

Method com.google.android.gms.internal.ads.zzbnu.zzn() calling method javax.crypto.Cipher.doFinal()


    public final byte[] zzn(byte[] p10)
    {
        if (p10.length <= (2147483647 - this.zzfim)) {
            String v0_6 = new byte[(this.zzfim + p10.length)];
            javax.crypto.Cipher v2_1 = com.google.android.gms.internal.ads.zzboy.zzeg(this.zzfim);
            System.arraycopy(v2_1, 0, v0_6, 0, this.zzfim);
            int v8 = p10.length;
            int v7 = this.zzfim;
            java.security.GeneralSecurityException v3_3 = ((javax.crypto.Cipher) com.google.android.gms.internal.ads.zzbol.zzfjr.zzfu("AES/CTR/NoPadding"));
            int v4_2 = new byte[this.zzfin];
            System.arraycopy(v2_1, 0, v4_2, 0, this.zzfim);
            v3_3.init(1, this.zzfil, new javax.crypto.spec.IvParameterSpec(v4_2));
            if (v3_3.doFinal(p10, 0, v8, v0_6, v7) == v8) {
                return v0_6;
            } else {
                throw new java.security.GeneralSecurityException("stored output\'s length does not match input\'s length");
            }
        } else {
            String v0_2 = (2147483647 - this.zzfim);
            javax.crypto.Cipher v2_7 = new StringBuilder(43);
            v2_7.append("plaintext length can not exceed ");
            v2_7.append(v0_2);
            throw new java.security.GeneralSecurityException(v2_7.toString());
        }
    }

Method com.google.android.gms.internal.ads.zzbnv.<init>() calling method javax.crypto.Cipher.doFinal()


    public zzbnv(byte[] p3, int p4)
    {
        if ((p4 == 12) || (p4 == 16)) {
            this.zzfiq = p4;
            com.google.android.gms.internal.ads.zzbpd.zzeh(p3.length);
            this.zzfil = new javax.crypto.spec.SecretKeySpec(p3, "AES");
            IllegalArgumentException v3_2 = javax.crypto.Cipher.getInstance("AES/ECB/NOPADDING");
            v3_2.init(1, this.zzfil);
            String v4_3 = new byte[16];
            this.zzfio = com.google.android.gms.internal.ads.zzbnv.zzo(v3_2.doFinal(v4_3));
            this.zzfip = com.google.android.gms.internal.ads.zzbnv.zzo(this.zzfio);
            return;
        } else {
            throw new IllegalArgumentException("IV size should be either 12 or 16 bytes");
        }
    }

Method com.google.android.gms.internal.ads.zzbnv.zza() calling method javax.crypto.Cipher.doFinal()


    private final byte[] zza(javax.crypto.Cipher p7, int p8, byte[] p9, int p10, int p11)
    {
        int v1_0 = new byte[16];
        v1_0[15] = ((byte) p8);
        if (p11 != 0) {
            int v1_1 = 0;
            byte[] v2_1 = p7.doFinal(v1_0);
            byte[] v8_1 = 0;
            while ((p11 - v8_1) > 16) {
                int v3_1 = 0;
                while (v3_1 < 16) {
                    v2_1[v3_1] = ((byte) (v2_1[v3_1] ^ p9[((p10 + v8_1) + v3_1)]));
                    v3_1++;
                }
                v2_1 = p7.doFinal(v2_1);
                v8_1 += 16;
            }
            byte[] v8_9;
            byte[] v8_3 = java.util.Arrays.copyOfRange(p9, (v8_1 + p10), (p10 + p11));
            if (v8_3.length != 16) {
                byte[] v9_3 = java.util.Arrays.copyOf(this.zzfip, 16);
                while (v1_1 < v8_3.length) {
                    v9_3[v1_1] = ((byte) (v9_3[v1_1] ^ v8_3[v1_1]));
                    v1_1++;
                }
                v9_3[v8_3.length] = ((byte) (v9_3[v8_3.length] ^ 128));
                v8_9 = v9_3;
            } else {
                v8_9 = com.google.android.gms.internal.ads.zzbnv.zzd(v8_3, this.zzfio);
            }
            return p7.doFinal(com.google.android.gms.internal.ads.zzbnv.zzd(v2_1, v8_9));
        } else {
            return p7.doFinal(com.google.android.gms.internal.ads.zzbnv.zzd(v1_0, this.zzfio));
        }
    }

Method com.google.android.gms.internal.ads.zzbnv.zzc() calling method javax.crypto.Cipher.doFinal()


    public final byte[] zzc(byte[] p16, byte[] p17)
    {
        com.google.android.gms.internal.ads.zzbnv v6 = this;
        if (p16.length <= ((2147483647 - this.zzfiq) - 16)) {
            byte v3_1;
            int v10 = 0;
            byte[] v11 = new byte[((this.zzfiq + p16.length) + 16)];
            byte v3_0 = com.google.android.gms.internal.ads.zzboy.zzeg(this.zzfiq);
            System.arraycopy(v3_0, 0, v11, 0, this.zzfiq);
            javax.crypto.Cipher v12 = javax.crypto.Cipher.getInstance("AES/ECB/NOPADDING");
            v12.init(1, this.zzfil);
            byte[] v13 = this.zza(v12, 0, v3_0, 0, v3_0.length);
            if (p17 != null) {
                v3_1 = p17;
            } else {
                byte[] v0_8 = new byte[0];
                v3_1 = v0_8;
            }
            byte[] v14 = this.zza(v12, 1, v3_1, 0, v3_1.length);
            byte[] v0_11 = javax.crypto.Cipher.getInstance("AES/CTR/NOPADDING");
            v0_11.init(1, this.zzfil, new javax.crypto.spec.IvParameterSpec(v13));
            v0_11.doFinal(p16, 0, p16.length, v11, this.zzfiq);
            byte[] v0_14 = v6.zza(v12, 2, v11, v6.zzfiq, p16.length);
            while (v10 < 16) {
                v11[((p16.length + this.zzfiq) + v10)] = ((byte) ((v14[v10] ^ v13[v10]) ^ v0_14[v10]));
                v10++;
            }
            return v11;
        } else {
            throw new java.security.GeneralSecurityException("plaintext too long");
        }
    }

Method com.google.android.gms.internal.ads.zzbnw.zzc() calling method javax.crypto.Cipher.doFinal()


    public final byte[] zzc(byte[] p12, byte[] p13)
    {
        if (p12.length <= 2147483619) {
            Object[] v4_0 = new byte[((p12.length + 12) + 16)];
            javax.crypto.Cipher v5_0 = com.google.android.gms.internal.ads.zzboy.zzeg(12);
            System.arraycopy(v5_0, 0, v4_0, 0, 12);
            String v2_2 = ((javax.crypto.Cipher) com.google.android.gms.internal.ads.zzbol.zzfjr.zzfu("AES/GCM/NoPadding"));
            v2_2.init(1, this.zzfir, com.google.android.gms.internal.ads.zzbnw.zzf(v5_0, 0, v5_0.length));
            if ((p13 != null) && (p13.length != 0)) {
                v2_2.updateAAD(p13);
            }
            String v13_1 = v2_2.doFinal(p12, 0, p12.length, v4_0, 12);
            if (v13_1 == (p12.length + 16)) {
                return v4_0;
            } else {
                String v13_2 = (v13_1 - p12.length);
                Object[] v4_2 = new Object[2];
                v4_2[0] = Integer.valueOf(16);
                v4_2[1] = Integer.valueOf(v13_2);
                throw new java.security.GeneralSecurityException(String.format("encryption failed; GCM tag must be %s bytes, but got only %s bytes", v4_2));
            }
        } else {
            throw new java.security.GeneralSecurityException("plaintext too long");
        }
    }

Method com.inmobi.commons.core.utilities.a.b.a() calling method javax.crypto.Cipher.doFinal()


    public static byte[] a(byte[] p2, String p3, String p4)
    {
        try {
            StringBuilder v3_2 = ((java.security.interfaces.RSAPublicKey) java.security.KeyFactory.getInstance("RSA").generatePublic(new java.security.spec.RSAPublicKeySpec(new java.math.BigInteger(p4, 16), new java.math.BigInteger(p3, 16))));
            String v4_2 = javax.crypto.Cipher.getInstance("RSA/ECB/nopadding");
            v4_2.init(1, v3_2);
            int v2_1 = v4_2.doFinal(p2);
        } catch (int v2_2) {
            new StringBuilder("SDK encountered unexpected error in getting encrypted RSA bytes; ").append(v2_2.getMessage());
            v2_1 = 0;
        }
        return v2_1;
    }

Method com.inmobi.commons.core.utilities.a.b.a() calling method javax.crypto.Cipher.doFinal()


    public static byte[] a(byte[] p3, byte[] p4, byte[] p5)
    {
        javax.crypto.spec.SecretKeySpec v0_1 = new javax.crypto.spec.SecretKeySpec(p4, ark>com.inmobi.commons.core.utilities.a.bark>.b);
        try {
            StringBuilder v4_4 = javax.crypto.Cipher.getInstance(ark>com.inmobi.commons.core.utilities.a.bark>.c);
            v4_4.init(2, v0_1, new javax.crypto.spec.IvParameterSpec(p5));
            int v3_1 = v4_4.doFinal(p3);
        } catch (int v3_2) {
            new StringBuilder("SDK encountered unexpected error in decrypting AES response; ").append(v3_2.getMessage());
            v3_1 = 0;
        }
        return v3_1;
    }

Method com.inmobi.commons.core.utilities.a.b.b() calling method javax.crypto.Cipher.doFinal()


    private static byte[] b(byte[] p2, byte[] p3, byte[] p4)
    {
        javax.crypto.spec.SecretKeySpec v0_1 = new javax.crypto.spec.SecretKeySpec(p3, com.inmobi.commons.core.utilities.a.b.b);
        StringBuilder v3_4 = new javax.crypto.spec.IvParameterSpec(p4);
        try {
            String v4_3 = javax.crypto.Cipher.getInstance(com.inmobi.commons.core.utilities.a.b.c);
            v4_3.init(1, v0_1, v3_4);
            v4_3.init(1, v0_1, v3_4);
            v4_3.init(1, v0_1, v3_4);
            int v2_1 = v4_3.doFinal(p2);
        } catch (int v2_2) {
            new StringBuilder("SDK encountered unexpected error in getting encrypted AES bytes; ").append(v2_2.getMessage());
            v2_1 = 0;
        }
        return v2_1;
    }

Method com.inmobi.commons.core.utilities.a.c.a() calling method javax.crypto.Cipher.doFinal()


    private static byte[] a(byte[] p7, javax.crypto.Cipher p8)
    {
        int v0 = 0;
        byte[] v1 = new byte[0];
        int v3 = p7.length;
        byte[] v4_3 = new byte[64];
        while (v0 < v3) {
            if ((v0 > 0) && ((v0 % 64) == 0)) {
                byte[] v4_2;
                v1 = ark>com.inmobi.commons.core.utilities.a.cark>.a(v1, p8.doFinal(v4_3));
                if ((v0 + 64) <= v3) {
                    v4_2 = 64;
                } else {
                    v4_2 = (v3 - v0);
                }
                v4_3 = new byte[v4_2];
            }
            v4_3[(v0 % 64)] = p7[v0];
            v0++;
        }
        return ark>com.inmobi.commons.core.utilities.a.cark>.a(v1, p8.doFinal(v4_3));
    }

Method com.utilities.k.b() calling method javax.crypto.Cipher.doFinal()


    public byte[] b(String p5)
    {
        if ((p5 != null) && (p5.length() != 0)) {
            try {
                this.c.init(1, this.b, this.a);
                return this.c.doFinal(com.utilities.k.e(p5).getBytes());
            } catch (String v5_4) {
                StringBuilder v1_1 = new StringBuilder();
                v1_1.append("[encrypt] ");
                v1_1.append(v5_4.getMessage());
                throw new Exception(v1_1.toString());
            }
        } else {
            throw new Exception("Empty string");
        }
    }

Method com.utilities.k.c() calling method javax.crypto.Cipher.doFinal()


    public byte[] c(String p4)
    {
        if ((p4 != null) && (p4.length() != 0)) {
            try {
                this.c.init(1, this.b);
                return this.c.doFinal(com.utilities.k.e(p4).getBytes());
            } catch (String v4_4) {
                StringBuilder v1_1 = new StringBuilder();
                v1_1.append("[encrypt] ");
                v1_1.append(v4_4.getMessage());
                throw new Exception(v1_1.toString());
            }
        } else {
            throw new Exception("Empty string");
        }
    }

Method com.utilities.k.d() calling method javax.crypto.Cipher.doFinal()


    public byte[] d(String p4)
    {
        if ((p4 != null) && (p4.length() != 0)) {
            try {
                this.c.init(2, this.b);
                return this.c.doFinal(com.utilities.k.a(p4));
            } catch (String v4_3) {
                StringBuilder v1_1 = new StringBuilder();
                v1_1.append("[decrypt] ");
                v1_1.append(v4_3.getMessage());
                throw new Exception(v1_1.toString());
            }
        } else {
            throw new Exception("Empty string");
        }
    }

Method com.google.android.gms.internal.ads.zzcw.zzb() calling method javax.crypto.Cipher.getIV()


    public final String zzb(byte[] p5, byte[] p6)
    {
        if (p5.length == 16) {
            try {
            } catch (String v5_9) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_9);
            } catch (String v5_8) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_8);
            } catch (String v5_7) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_7);
            } catch (String v5_6) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_6);
            } catch (String v5_5) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v5_5);
            }
            com.google.android.gms.internal.ads.zzcw.getCipher().init(1, new javax.crypto.spec.SecretKeySpec(p5, "AES"), 0);
            int v6_1 = com.google.android.gms.internal.ads.zzcw.getCipher().doFinal(p6);
            java.nio.ByteBuffer v0_3 = com.google.android.gms.internal.ads.zzcw.getCipher().getIV();
            String v5_2 = (v6_1.length + v0_3.length);
            java.nio.ByteBuffer v1_2 = java.nio.ByteBuffer.allocate(v5_2);
            v1_2.put(v0_3).put(v6_1);
            v1_2.flip();
            String v5_3 = new byte[v5_2];
            v1_2.get(v5_3);
            return com.google.android.gms.internal.ads.zzbu.zza(v5_3, 0);
        } else {
            throw new com.google.android.gms.internal.ads.zzcx(this);
        }
    }

Method com.comscore.utils.Utils.encrypt() calling method javax.crypto.Cipher.getInstance()


    public static String encrypt(String p4)
    {
        Class v0_6 = java.security.KeyFactory.getInstance("RSA").generatePublic(new java.security.spec.X509EncodedKeySpec(com.comscore.utils.Constants.RSA_PUBLIC_KEY));
        String v1_1 = javax.crypto.Cipher.getInstance("RSA/ECB/PKCS1PADDING");
        v1_1.init(1, v0_6);
        String v1_3 = new String(com.comscore.utils.Base64Coder.encode(v1_1.doFinal(p4.getBytes())));
        StringBuilder v2_2 = new StringBuilder();
        v2_2.append("encrypt(");
        v2_2.append(p4);
        v2_2.append(")=");
        v2_2.append(v1_3);
        com.comscore.utils.CSLog.d(com.comscore.utils.Utils, v2_2.toString());
        return v1_3;
    }

Method com.exoplayer2.upstream.cache.h.g() calling method javax.crypto.Cipher.getInstance()

Couldn't retrieve source code

Method com.exoplayer2.upstream.EncryptedFileDataSource2.<init>() calling method javax.crypto.Cipher.getInstance()


    public EncryptedFileDataSource2()
    {
        super(0);
        try {
            super.g = javax.crypto.Cipher.getInstance(com.gaana.application.GaanaApplication.getEncryptionKey(2));
            super.a = new javax.crypto.spec.SecretKeySpec(new StringBuilder(com.gaana.application.GaanaApplication.getEncryptionKey(0)).reverse().toString().getBytes(), "AES");
            super.b = new javax.crypto.spec.IvParameterSpec(new StringBuilder(com.gaana.application.GaanaApplication.getEncryptionKey(1)).reverse().toString().getBytes());
            super.g.init(2, super.a, super.b);
        } catch (java.security.InvalidKeyException v0_11) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v0_11);
        } catch (java.security.InvalidKeyException v0_10) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v0_10);
        } catch (java.security.InvalidKeyException v0_9) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v0_9);
        } catch (java.security.InvalidKeyException v0_8) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v0_8);
        }
        return;
    }

Method com.google.ads.interactivemedia.v3.internal.kf.a() calling method javax.crypto.Cipher.getInstance()


    public byte[] a(byte[] p5, String p6)
    {
        if (p5.length == 16) {
            try {
                byte[] v6_16 = this.a.a(p6, 0);
            } catch (byte[] v5_12) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_12);
            } catch (byte[] v5_11) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_11);
            } catch (byte[] v5_10) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_10);
            } catch (byte[] v5_9) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_9);
            } catch (byte[] v5_8) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_8);
            } catch (byte[] v5_7) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_7);
            } catch (byte[] v5_6) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_6);
            }
            if (v6_16.length > 16) {
                int v1_1 = java.nio.ByteBuffer.allocate(v6_16.length);
                v1_1.put(v6_16);
                v1_1.flip();
                byte[] v2_0 = new byte[16];
                byte[] v6_3 = new byte[(v6_16.length - 16)];
                v1_1.get(v2_0);
                v1_1.get(v6_3);
                javax.crypto.spec.SecretKeySpec v0_2 = new javax.crypto.spec.SecretKeySpec(p5, "AES");
                byte[] v5_2 = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5Padding");
                v5_2.init(2, v0_2, new javax.crypto.spec.IvParameterSpec(v2_0));
                return v5_2.doFinal(v6_3);
            } else {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this);
            }
        } else {
            throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this);
        }
    }

Method com.google.android.exoplayer2.upstream.crypto.AesFlushingCipher.<init>() calling method javax.crypto.Cipher.getInstance()


    public AesFlushingCipher(int p6, byte[] p7, long p8, long p10)
    {
        try {
            this.cipher = javax.crypto.Cipher.getInstance("AES/CTR/NoPadding");
            this.blockSize = this.cipher.getBlockSize();
            long v0_1 = new byte[this.blockSize];
            this.zerosBlock = v0_1;
            long v0_3 = new byte[this.blockSize];
            this.flushedBlock = v0_3;
            int v10_2 = ((int) (p10 % ((long) this.blockSize)));
            this.cipher.init(p6, new javax.crypto.spec.SecretKeySpec(p7, com.google.android.exoplayer2.util.Util.splitAtFirst(this.cipher.getAlgorithm(), "/")[0]), new javax.crypto.spec.IvParameterSpec(this.getInitializationVector(p8, (p10 / ((long) this.blockSize)))));
        } catch (byte[] v6_2) {
            throw new RuntimeException(v6_2);
        }
        if (v10_2 != 0) {
            byte[] v6_1 = new byte[v10_2];
            this.updateInPlace(v6_1, 0, v10_2);
        }
        return;
    }

Method com.google.android.gms.internal.ads.zzcw.getCipher() calling method javax.crypto.Cipher.getInstance()


    private static javax.crypto.Cipher getCipher()
    {
        try {
            if (com.google.android.gms.internal.ads.zzcw.zzsb == null) {
                com.google.android.gms.internal.ads.zzcw.zzsb = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5Padding");
            }
        } catch (javax.crypto.Cipher v1_4) {
            throw v1_4;
        }
        return com.google.android.gms.internal.ads.zzcw.zzsb;
    }

Method com.google.android.exoplayer2.source.hls.Aes128DataSource.getCipherInstance() calling method javax.crypto.Cipher.getInstance()


    protected javax.crypto.Cipher getCipherInstance()
    {
        return javax.crypto.Cipher.getInstance("AES/CBC/PKCS7Padding");
    }

Method com.google.android.gms.internal.ads.zzbnv.<init>() calling method javax.crypto.Cipher.getInstance()


    public zzbnv(byte[] p3, int p4)
    {
        if ((p4 == 12) || (p4 == 16)) {
            this.zzfiq = p4;
            com.google.android.gms.internal.ads.zzbpd.zzeh(p3.length);
            this.zzfil = new javax.crypto.spec.SecretKeySpec(p3, "AES");
            IllegalArgumentException v3_2 = javax.crypto.Cipher.getInstance("AES/ECB/NOPADDING");
            v3_2.init(1, this.zzfil);
            String v4_3 = new byte[16];
            this.zzfio = com.google.android.gms.internal.ads.zzbnv.zzo(v3_2.doFinal(v4_3));
            this.zzfip = com.google.android.gms.internal.ads.zzbnv.zzo(this.zzfio);
            return;
        } else {
            throw new IllegalArgumentException("IV size should be either 12 or 16 bytes");
        }
    }

Method com.google.android.gms.internal.ads.zzbnv.zzc() calling method javax.crypto.Cipher.getInstance()


    public final byte[] zzc(byte[] p16, byte[] p17)
    {
        com.google.android.gms.internal.ads.zzbnv v6 = this;
        if (p16.length <= ((2147483647 - this.zzfiq) - 16)) {
            byte v3_1;
            int v10 = 0;
            byte[] v11 = new byte[((this.zzfiq + p16.length) + 16)];
            byte v3_0 = com.google.android.gms.internal.ads.zzboy.zzeg(this.zzfiq);
            System.arraycopy(v3_0, 0, v11, 0, this.zzfiq);
            javax.crypto.Cipher v12 = javax.crypto.Cipher.getInstance("AES/ECB/NOPADDING");
            v12.init(1, this.zzfil);
            byte[] v13 = this.zza(v12, 0, v3_0, 0, v3_0.length);
            if (p17 != null) {
                v3_1 = p17;
            } else {
                byte[] v0_8 = new byte[0];
                v3_1 = v0_8;
            }
            byte[] v14 = this.zza(v12, 1, v3_1, 0, v3_1.length);
            byte[] v0_11 = javax.crypto.Cipher.getInstance("AES/CTR/NOPADDING");
            v0_11.init(1, this.zzfil, new javax.crypto.spec.IvParameterSpec(v13));
            v0_11.doFinal(p16, 0, p16.length, v11, this.zzfiq);
            byte[] v0_14 = v6.zza(v12, 2, v11, v6.zzfiq, p16.length);
            while (v10 < 16) {
                v11[((p16.length + this.zzfiq) + v10)] = ((byte) ((v14[v10] ^ v13[v10]) ^ v0_14[v10]));
                v10++;
            }
            return v11;
        } else {
            throw new java.security.GeneralSecurityException("plaintext too long");
        }
    }

Method com.google.android.gms.internal.ads.zzbon.zzb() calling method javax.crypto.Cipher.getInstance()


    public final synthetic Object zzb(String p1, java.security.Provider p2)
    {
        if (p2 != null) {
            return javax.crypto.Cipher.getInstance(p1, p2);
        } else {
            return javax.crypto.Cipher.getInstance(p1);
        }
    }

Method com.inmobi.commons.core.utilities.a.b.a() calling method javax.crypto.Cipher.getInstance()


    public static byte[] a(byte[] p2, String p3, String p4)
    {
        try {
            StringBuilder v3_2 = ((java.security.interfaces.RSAPublicKey) java.security.KeyFactory.getInstance("RSA").generatePublic(new java.security.spec.RSAPublicKeySpec(new java.math.BigInteger(p4, 16), new java.math.BigInteger(p3, 16))));
            String v4_2 = javax.crypto.Cipher.getInstance("RSA/ECB/nopadding");
            v4_2.init(1, v3_2);
            int v2_1 = v4_2.doFinal(p2);
        } catch (int v2_2) {
            new StringBuilder("SDK encountered unexpected error in getting encrypted RSA bytes; ").append(v2_2.getMessage());
            v2_1 = 0;
        }
        return v2_1;
    }

Method com.inmobi.commons.core.utilities.a.b.a() calling method javax.crypto.Cipher.getInstance()


    public static byte[] a(byte[] p3, byte[] p4, byte[] p5)
    {
        javax.crypto.spec.SecretKeySpec v0_1 = new javax.crypto.spec.SecretKeySpec(p4, ark>com.inmobi.commons.core.utilities.a.bark>.b);
        try {
            StringBuilder v4_4 = javax.crypto.Cipher.getInstance(ark>com.inmobi.commons.core.utilities.a.bark>.c);
            v4_4.init(2, v0_1, new javax.crypto.spec.IvParameterSpec(p5));
            int v3_1 = v4_4.doFinal(p3);
        } catch (int v3_2) {
            new StringBuilder("SDK encountered unexpected error in decrypting AES response; ").append(v3_2.getMessage());
            v3_1 = 0;
        }
        return v3_1;
    }

Method com.inmobi.commons.core.utilities.a.b.b() calling method javax.crypto.Cipher.getInstance()


    private static byte[] b(byte[] p2, byte[] p3, byte[] p4)
    {
        javax.crypto.spec.SecretKeySpec v0_1 = new javax.crypto.spec.SecretKeySpec(p3, com.inmobi.commons.core.utilities.a.b.b);
        StringBuilder v3_4 = new javax.crypto.spec.IvParameterSpec(p4);
        try {
            String v4_3 = javax.crypto.Cipher.getInstance(com.inmobi.commons.core.utilities.a.b.c);
            v4_3.init(1, v0_1, v3_4);
            v4_3.init(1, v0_1, v3_4);
            v4_3.init(1, v0_1, v3_4);
            int v2_1 = v4_3.doFinal(p2);
        } catch (int v2_2) {
            new StringBuilder("SDK encountered unexpected error in getting encrypted AES bytes; ").append(v2_2.getMessage());
            v2_1 = 0;
        }
        return v2_1;
    }

Method com.inmobi.commons.core.utilities.a.c.a() calling method javax.crypto.Cipher.getInstance()


    public static String a(String p5)
    {
        if ((p5 != null) && (!"".equals(p5))) {
            try {
                String v2_3 = javax.crypto.Cipher.getInstance("RSA/ECB/nopadding");
                v2_3.init(1, ((java.security.interfaces.RSAPublicKey) java.security.KeyFactory.getInstance("RSA").generatePublic(new java.security.spec.RSAPublicKeySpec(new java.math.BigInteger("C10F7968CFE2C76AC6F0650C877806D4514DE58FC239592D2385BCE5609A84B2A0FBDAF29B05505EAD1FDFEF3D7209ACBF34B5D0A806DF18147EA9C0337D6B5B", 16), new java.math.BigInteger("010001", 16)))));
                String v0_1 = new String(android.util.Base64.encode(ark>com.inmobi.commons.core.utilities.a.cark>.a(p5.getBytes("UTF-8"), v2_3), 0));
            } catch (String v5_4) {
                new StringBuilder("SDK encountered unexpected error in getting encrypted UID-map; ").append(v5_4.getMessage());
            }
            return v0_1;
        } else {
            return 0;
        }
    }

Method com.utilities.i.a() calling method javax.crypto.Cipher.getInstance()


    public static java.io.OutputStream a(java.io.OutputStream p6)
    {
        try {
            javax.crypto.Cipher v0_2 = javax.crypto.Cipher.getInstance(com.gaana.application.GaanaApplication.getEncryptionKey(2));
            v0_2.init(1, new javax.crypto.spec.SecretKeySpec(new StringBuilder(com.gaana.application.GaanaApplication.getEncryptionKey(0)).reverse().toString().getBytes(), "AES"), new javax.crypto.spec.IvParameterSpec(new StringBuilder(com.gaana.application.GaanaApplication.getEncryptionKey(1)).reverse().toString().getBytes()));
            return new javax.crypto.CipherOutputStream(p6, v0_2);
        } catch (int v6_4) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v6_4);
            return 0;
        } catch (int v6_3) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v6_3);
            return 0;
        } catch (int v6_2) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v6_2);
            return 0;
        } catch (int v6_1) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v6_1);
            return 0;
        }
    }

Method com.utilities.k.<init>() calling method javax.crypto.Cipher.getInstance()


    public k(String p3)
    {
        this.b = new javax.crypto.spec.SecretKeySpec(p3.getBytes(), "AES");
        try {
            this.c = javax.crypto.Cipher.getInstance("AES/ECB/NoPadding");
        } catch (javax.crypto.NoSuchPaddingException v3_2) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v3_2);
        } catch (javax.crypto.NoSuchPaddingException v3_1) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v3_1);
        }
        return;
    }

Method com.utilities.k.<init>() calling method javax.crypto.Cipher.getInstance()


    public k(String p2, String p3)
    {
        this.a = new javax.crypto.spec.IvParameterSpec(p3.getBytes());
        this.b = new javax.crypto.spec.SecretKeySpec(p2.getBytes(), "AES");
        try {
            this.c = javax.crypto.Cipher.getInstance("AES/CBC/NoPadding");
        } catch (javax.crypto.NoSuchPaddingException v2_4) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v2_4);
        } catch (javax.crypto.NoSuchPaddingException v2_3) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v2_3);
        }
        return;
    }

Method com.inmobi.commons.core.utilities.a.b.b() calling method javax.crypto.KeyGenerator.generateKey()


    private static byte[] b()
    {
        try {
            int v0_4 = javax.crypto.KeyGenerator.getInstance("AES");
            v0_4.init(128, new java.security.SecureRandom());
            int v0_6 = v0_4.generateKey();
        } catch (int v0_1) {
            new StringBuilder("SDK encountered unexpected error in generating AES public key; ").append(v0_1.getMessage());
            return 0;
        }
        if (v0_6 == 0) {
            return 0;
        } else {
            return v0_6.getEncoded();
        }
    }

Method com.inmobi.commons.core.utilities.a.b.b() calling method javax.crypto.KeyGenerator.getInstance()


    private static byte[] b()
    {
        try {
            int v0_4 = javax.crypto.KeyGenerator.getInstance("AES");
            v0_4.init(128, new java.security.SecureRandom());
            int v0_6 = v0_4.generateKey();
        } catch (int v0_1) {
            new StringBuilder("SDK encountered unexpected error in generating AES public key; ").append(v0_1.getMessage());
            return 0;
        }
        if (v0_6 == 0) {
            return 0;
        } else {
            return v0_6.getEncoded();
        }
    }

Method com.exoplayer2.upstream.EncryptedFileDataSource2$a.a() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public long a(long p10)
    {
        long v0_1 = this.a.skip(p10);
        try {
            byte[] v10_4;
            int v4_1 = ((int) (p10 % 16));
            byte[] v10_3 = new java.math.BigInteger(1, this.d.getIV()).add(java.math.BigInteger.valueOf(((p10 - ((long) v4_1)) / 16))).toByteArray();
        } catch (Exception) {
            return 0;
        }
        if (v10_3.length >= 16) {
            v10_4 = new javax.crypto.spec.IvParameterSpec(v10_3, (v10_3.length - 16), 16);
        } else {
            javax.crypto.Cipher v11_6 = new byte[16];
            System.arraycopy(v10_3, 0, v11_6, (16 - v10_3.length), v10_3.length);
            v10_4 = new javax.crypto.spec.IvParameterSpec(v11_6);
        }
        this.b.init(1, this.c, v10_4);
        byte[] v10_7 = new byte[v4_1];
        this.b.update(v10_7, 0, v4_1, v10_7);
        java.util.Arrays.fill(v10_7, 0);
        return v0_1;
    }

Method com.exoplayer2.upstream.cache.h.e() calling method javax.crypto.spec.IvParameterSpec.<init>()

Couldn't retrieve source code

Method com.exoplayer2.upstream.cache.h.f() calling method javax.crypto.spec.IvParameterSpec.<init>()


    private void f()
    {
        try {
            java.io.DataOutputStream v1_5 = this.d.startWrite();
        } catch (java.io.DataOutputStream v1_3) {
            java.io.DataOutputStream v1_2 = 0;
            java.security.InvalidKeyException v0_2 = v1_3;
            com.google.android.exoplayer2.util.Util.closeQuietly(v1_2);
            throw v0_2;
        } catch (java.io.DataOutputStream v1_1) {
            v1_2 = 0;
            java.security.InvalidKeyException v0_1 = v1_1;
            throw new com.exoplayer2.upstream.cache.Cache$CacheException(v0_1);
        } catch (java.security.InvalidKeyException v0_2) {
        }
        if (this.i != null) {
            this.i.reset(v1_5);
        } else {
            this.i = new com.google.android.exoplayer2.util.ReusableBufferedOutputStream(v1_5);
        }
        v1_2 = new java.io.DataOutputStream(this.i);
        try {
            v1_2.writeInt(2);
            v1_2.writeInt(this.g);
        } catch (java.security.InvalidKeyException v0_1) {
        }
        if (this.g) {
            int v3_3 = new byte[16];
            new java.util.Random().nextBytes(v3_3);
            v1_2.write(v3_3);
            this.e.init(1, this.f, new javax.crypto.spec.IvParameterSpec(v3_3));
            v1_2.flush();
            v1_2 = new java.io.DataOutputStream(new javax.crypto.CipherOutputStream(this.i, this.e));
        }
        v1_2.writeInt(this.a.size());
        int v3_9 = 0;
        javax.crypto.CipherOutputStream v4_8 = this.a.values().iterator();
        while (v4_8.hasNext()) {
            int v5_4 = ((com.exoplayer2.upstream.cache.g) v4_8.next());
            v5_4.a(v1_2);
            v3_9 += v5_4.a(2);
        }
        v1_2.writeInt(v3_9);
        this.d.endWrite(v1_2);
        com.google.android.exoplayer2.util.Util.closeQuietly(0);
        return;
    }

Method com.exoplayer2.upstream.EncryptedFileDataSource2.<init>() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public EncryptedFileDataSource2()
    {
        super(0);
        try {
            super.g = javax.crypto.Cipher.getInstance(com.gaana.application.GaanaApplication.getEncryptionKey(2));
            super.a = new javax.crypto.spec.SecretKeySpec(new StringBuilder(com.gaana.application.GaanaApplication.getEncryptionKey(0)).reverse().toString().getBytes(), "AES");
            super.b = new javax.crypto.spec.IvParameterSpec(new StringBuilder(com.gaana.application.GaanaApplication.getEncryptionKey(1)).reverse().toString().getBytes());
            super.g.init(2, super.a, super.b);
        } catch (java.security.InvalidKeyException v0_11) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v0_11);
        } catch (java.security.InvalidKeyException v0_10) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v0_10);
        } catch (java.security.InvalidKeyException v0_9) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v0_9);
        } catch (java.security.InvalidKeyException v0_8) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v0_8);
        }
        return;
    }

Method com.google.ads.interactivemedia.v3.internal.kf.a() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public byte[] a(byte[] p5, String p6)
    {
        if (p5.length == 16) {
            try {
                byte[] v6_16 = this.a.a(p6, 0);
            } catch (byte[] v5_12) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_12);
            } catch (byte[] v5_11) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_11);
            } catch (byte[] v5_10) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_10);
            } catch (byte[] v5_9) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_9);
            } catch (byte[] v5_8) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_8);
            } catch (byte[] v5_7) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_7);
            } catch (byte[] v5_6) {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this, v5_6);
            }
            if (v6_16.length > 16) {
                int v1_1 = java.nio.ByteBuffer.allocate(v6_16.length);
                v1_1.put(v6_16);
                v1_1.flip();
                byte[] v2_0 = new byte[16];
                byte[] v6_3 = new byte[(v6_16.length - 16)];
                v1_1.get(v2_0);
                v1_1.get(v6_3);
                javax.crypto.spec.SecretKeySpec v0_2 = new javax.crypto.spec.SecretKeySpec(p5, "AES");
                byte[] v5_2 = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5Padding");
                v5_2.init(2, v0_2, new javax.crypto.spec.IvParameterSpec(v2_0));
                return v5_2.doFinal(v6_3);
            } else {
                throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this);
            }
        } else {
            throw new ark>com.google.ads.interactivemedia.v3.internal.kfark>$a(this);
        }
    }

Method com.google.android.exoplayer2.upstream.cache.CachedContentIndex.readFile() calling method javax.crypto.spec.IvParameterSpec.<init>()

Couldn't retrieve source code

Method com.google.android.exoplayer2.upstream.cache.CachedContentIndex.writeFile() calling method javax.crypto.spec.IvParameterSpec.<init>()


    private void writeFile()
    {
        try {
            java.io.DataOutputStream v1_5 = this.atomicFile.startWrite();
        } catch (java.io.DataOutputStream v1_3) {
            java.io.DataOutputStream v1_2 = 0;
            java.security.InvalidKeyException v0_2 = v1_3;
            com.google.android.exoplayer2.util.Util.closeQuietly(v1_2);
            throw v0_2;
        } catch (java.io.DataOutputStream v1_1) {
            v1_2 = 0;
            java.security.InvalidKeyException v0_1 = v1_1;
            throw new com.google.android.exoplayer2.upstream.cache.Cache$CacheException(v0_1);
        } catch (java.security.InvalidKeyException v0_2) {
        }
        if (this.bufferedOutputStream != null) {
            this.bufferedOutputStream.reset(v1_5);
        } else {
            this.bufferedOutputStream = new com.google.android.exoplayer2.util.ReusableBufferedOutputStream(v1_5);
        }
        v1_2 = new java.io.DataOutputStream(this.bufferedOutputStream);
        try {
            v1_2.writeInt(2);
            v1_2.writeInt(this.encrypt);
        } catch (java.security.InvalidKeyException v0_1) {
        }
        if (this.encrypt) {
            int v3_3 = new byte[16];
            new java.util.Random().nextBytes(v3_3);
            v1_2.write(v3_3);
            this.cipher.init(1, this.secretKeySpec, new javax.crypto.spec.IvParameterSpec(v3_3));
            v1_2.flush();
            v1_2 = new java.io.DataOutputStream(new javax.crypto.CipherOutputStream(this.bufferedOutputStream, this.cipher));
        }
        v1_2.writeInt(this.keyToContent.size());
        int v3_9 = 0;
        javax.crypto.CipherOutputStream v4_8 = this.keyToContent.values().iterator();
        while (v4_8.hasNext()) {
            int v5_4 = ((com.google.android.exoplayer2.upstream.cache.CachedContent) v4_8.next());
            v5_4.writeToStream(v1_2);
            v3_9 += v5_4.headerHashCode(2);
        }
        v1_2.writeInt(v3_9);
        this.atomicFile.endWrite(v1_2);
        com.google.android.exoplayer2.util.Util.closeQuietly(0);
        return;
    }

Method com.google.android.exoplayer2.upstream.crypto.AesFlushingCipher.<init>() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public AesFlushingCipher(int p6, byte[] p7, long p8, long p10)
    {
        try {
            this.cipher = javax.crypto.Cipher.getInstance("AES/CTR/NoPadding");
            this.blockSize = this.cipher.getBlockSize();
            long v0_1 = new byte[this.blockSize];
            this.zerosBlock = v0_1;
            long v0_3 = new byte[this.blockSize];
            this.flushedBlock = v0_3;
            int v10_2 = ((int) (p10 % ((long) this.blockSize)));
            this.cipher.init(p6, new javax.crypto.spec.SecretKeySpec(p7, com.google.android.exoplayer2.util.Util.splitAtFirst(this.cipher.getAlgorithm(), "/")[0]), new javax.crypto.spec.IvParameterSpec(this.getInitializationVector(p8, (p10 / ((long) this.blockSize)))));
        } catch (byte[] v6_2) {
            throw new RuntimeException(v6_2);
        }
        if (v10_2 != 0) {
            byte[] v6_1 = new byte[v10_2];
            this.updateInPlace(v6_1, 0, v10_2);
        }
        return;
    }

Method com.google.android.gms.internal.ads.zzcw.zza() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public final byte[] zza(byte[] p6, String p7)
    {
        if (p6.length == 16) {
            try {
                Throwable v7_12 = com.google.android.gms.internal.ads.zzbu.zza(p7, 0);
            } catch (Object v6_9) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_9);
            } catch (Object v6_8) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_8);
            } catch (Object v6_7) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_7);
            } catch (Object v6_6) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_6);
            } catch (Object v6_5) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_5);
            } catch (Object v6_4) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_4);
            } catch (Object v6_3) {
                throw new com.google.android.gms.internal.ads.zzcx(this, v6_3);
            }
            if (v7_12.length > 16) {
                javax.crypto.Cipher v1_1 = java.nio.ByteBuffer.allocate(v7_12.length);
                v1_1.put(v7_12);
                v1_1.flip();
                byte[] v2 = new byte[16];
                Throwable v7_3 = new byte[(v7_12.length - 16)];
                v1_1.get(v2);
                v1_1.get(v7_3);
                com.google.android.gms.internal.ads.zzcw.getCipher().init(2, new javax.crypto.spec.SecretKeySpec(p6, "AES"), new javax.crypto.spec.IvParameterSpec(v2));
                return com.google.android.gms.internal.ads.zzcw.getCipher().doFinal(v7_3);
            } else {
                throw new com.google.android.gms.internal.ads.zzcx(this);
            }
        } else {
            throw new com.google.android.gms.internal.ads.zzcx(this);
        }
    }

Method com.google.android.exoplayer2.source.hls.Aes128DataSource.open() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public final long open(com.google.android.exoplayer2.upstream.DataSpec p5)
    {
        try {
            RuntimeException v0_0 = this.getCipherInstance();
            try {
                v0_0.init(2, new javax.crypto.spec.SecretKeySpec(this.encryptionKey, "AES"), new javax.crypto.spec.IvParameterSpec(this.encryptionIv));
                com.google.android.exoplayer2.upstream.DataSourceInputStream v1_1 = new com.google.android.exoplayer2.upstream.DataSourceInputStream(this.upstream, p5);
                this.cipherInputStream = new javax.crypto.CipherInputStream(v1_1, v0_0);
                v1_1.open();
                return -1;
            } catch (java.security.InvalidKeyException v5_4) {
                throw new RuntimeException(v5_4);
            }
        } catch (java.security.InvalidKeyException v5_1) {
            throw new RuntimeException(v5_1);
        }
        v0_0.init(2, new javax.crypto.spec.SecretKeySpec(this.encryptionKey, "AES"), new javax.crypto.spec.IvParameterSpec(this.encryptionIv));
        v1_1 = new com.google.android.exoplayer2.upstream.DataSourceInputStream(this.upstream, p5);
        this.cipherInputStream = new javax.crypto.CipherInputStream(v1_1, v0_0);
        v1_1.open();
        return -1;
    }

Method com.google.android.gms.internal.ads.zzbnu.zzn() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public final byte[] zzn(byte[] p10)
    {
        if (p10.length <= (2147483647 - this.zzfim)) {
            String v0_6 = new byte[(this.zzfim + p10.length)];
            javax.crypto.Cipher v2_1 = com.google.android.gms.internal.ads.zzboy.zzeg(this.zzfim);
            System.arraycopy(v2_1, 0, v0_6, 0, this.zzfim);
            int v8 = p10.length;
            int v7 = this.zzfim;
            java.security.GeneralSecurityException v3_3 = ((javax.crypto.Cipher) com.google.android.gms.internal.ads.zzbol.zzfjr.zzfu("AES/CTR/NoPadding"));
            int v4_2 = new byte[this.zzfin];
            System.arraycopy(v2_1, 0, v4_2, 0, this.zzfim);
            v3_3.init(1, this.zzfil, new javax.crypto.spec.IvParameterSpec(v4_2));
            if (v3_3.doFinal(p10, 0, v8, v0_6, v7) == v8) {
                return v0_6;
            } else {
                throw new java.security.GeneralSecurityException("stored output\'s length does not match input\'s length");
            }
        } else {
            String v0_2 = (2147483647 - this.zzfim);
            javax.crypto.Cipher v2_7 = new StringBuilder(43);
            v2_7.append("plaintext length can not exceed ");
            v2_7.append(v0_2);
            throw new java.security.GeneralSecurityException(v2_7.toString());
        }
    }

Method com.google.android.gms.internal.ads.zzbnv.zzc() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public final byte[] zzc(byte[] p16, byte[] p17)
    {
        com.google.android.gms.internal.ads.zzbnv v6 = this;
        if (p16.length <= ((2147483647 - this.zzfiq) - 16)) {
            byte v3_1;
            int v10 = 0;
            byte[] v11 = new byte[((this.zzfiq + p16.length) + 16)];
            byte v3_0 = com.google.android.gms.internal.ads.zzboy.zzeg(this.zzfiq);
            System.arraycopy(v3_0, 0, v11, 0, this.zzfiq);
            javax.crypto.Cipher v12 = javax.crypto.Cipher.getInstance("AES/ECB/NOPADDING");
            v12.init(1, this.zzfil);
            byte[] v13 = this.zza(v12, 0, v3_0, 0, v3_0.length);
            if (p17 != null) {
                v3_1 = p17;
            } else {
                byte[] v0_8 = new byte[0];
                v3_1 = v0_8;
            }
            byte[] v14 = this.zza(v12, 1, v3_1, 0, v3_1.length);
            byte[] v0_11 = javax.crypto.Cipher.getInstance("AES/CTR/NOPADDING");
            v0_11.init(1, this.zzfil, new javax.crypto.spec.IvParameterSpec(v13));
            v0_11.doFinal(p16, 0, p16.length, v11, this.zzfiq);
            byte[] v0_14 = v6.zza(v12, 2, v11, v6.zzfiq, p16.length);
            while (v10 < 16) {
                v11[((p16.length + this.zzfiq) + v10)] = ((byte) ((v14[v10] ^ v13[v10]) ^ v0_14[v10]));
                v10++;
            }
            return v11;
        } else {
            throw new java.security.GeneralSecurityException("plaintext too long");
        }
    }

Method com.google.android.gms.internal.ads.zzbnw.zzf() calling method javax.crypto.spec.IvParameterSpec.<init>()


    private static java.security.spec.AlgorithmParameterSpec zzf(byte[] p2, int p3, int p4)
    {
        try {
            Class.forName("javax.crypto.spec.GCMParameterSpec");
            return new javax.crypto.spec.GCMParameterSpec(128, p2, 0, p4);
        } catch (ClassNotFoundException) {
            if (!com.google.android.gms.internal.ads.zzbpc.zzakd()) {
                throw new java.security.GeneralSecurityException("cannot use AES-GCM: javax.crypto.spec.GCMParameterSpec not found");
            } else {
                return new javax.crypto.spec.IvParameterSpec(p2, 0, p4);
            }
        }
    }

Method com.inmobi.commons.core.utilities.a.b.a() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public static byte[] a(byte[] p3, byte[] p4, byte[] p5)
    {
        javax.crypto.spec.SecretKeySpec v0_1 = new javax.crypto.spec.SecretKeySpec(p4, ark>com.inmobi.commons.core.utilities.a.bark>.b);
        try {
            StringBuilder v4_4 = javax.crypto.Cipher.getInstance(ark>com.inmobi.commons.core.utilities.a.bark>.c);
            v4_4.init(2, v0_1, new javax.crypto.spec.IvParameterSpec(p5));
            int v3_1 = v4_4.doFinal(p3);
        } catch (int v3_2) {
            new StringBuilder("SDK encountered unexpected error in decrypting AES response; ").append(v3_2.getMessage());
            v3_1 = 0;
        }
        return v3_1;
    }

Method com.inmobi.commons.core.utilities.a.b.b() calling method javax.crypto.spec.IvParameterSpec.<init>()


    private static byte[] b(byte[] p2, byte[] p3, byte[] p4)
    {
        javax.crypto.spec.SecretKeySpec v0_1 = new javax.crypto.spec.SecretKeySpec(p3, com.inmobi.commons.core.utilities.a.b.b);
        StringBuilder v3_4 = new javax.crypto.spec.IvParameterSpec(p4);
        try {
            String v4_3 = javax.crypto.Cipher.getInstance(com.inmobi.commons.core.utilities.a.b.c);
            v4_3.init(1, v0_1, v3_4);
            v4_3.init(1, v0_1, v3_4);
            v4_3.init(1, v0_1, v3_4);
            int v2_1 = v4_3.doFinal(p2);
        } catch (int v2_2) {
            new StringBuilder("SDK encountered unexpected error in getting encrypted AES bytes; ").append(v2_2.getMessage());
            v2_1 = 0;
        }
        return v2_1;
    }

Method com.utilities.i.a() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public static java.io.OutputStream a(java.io.OutputStream p6)
    {
        try {
            javax.crypto.Cipher v0_2 = javax.crypto.Cipher.getInstance(com.gaana.application.GaanaApplication.getEncryptionKey(2));
            v0_2.init(1, new javax.crypto.spec.SecretKeySpec(new StringBuilder(com.gaana.application.GaanaApplication.getEncryptionKey(0)).reverse().toString().getBytes(), "AES"), new javax.crypto.spec.IvParameterSpec(new StringBuilder(com.gaana.application.GaanaApplication.getEncryptionKey(1)).reverse().toString().getBytes()));
            return new javax.crypto.CipherOutputStream(p6, v0_2);
        } catch (int v6_4) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v6_4);
            return 0;
        } catch (int v6_3) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v6_3);
            return 0;
        } catch (int v6_2) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v6_2);
            return 0;
        } catch (int v6_1) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v6_1);
            return 0;
        }
    }

Method com.utilities.k.<init>() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public k(String p2, String p3)
    {
        this.a = new javax.crypto.spec.IvParameterSpec(p3.getBytes());
        this.b = new javax.crypto.spec.SecretKeySpec(p2.getBytes(), "AES");
        try {
            this.c = javax.crypto.Cipher.getInstance("AES/CBC/NoPadding");
        } catch (javax.crypto.NoSuchPaddingException v2_4) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v2_4);
        } catch (javax.crypto.NoSuchPaddingException v2_3) {
            com.google.devtools.build.android.desugar.runtime.ThrowableExtension.printStackTrace(v2_3);
        }
        return;
    }