Info Call to Crypto API

Description

List of all calls to cryptographic methods.

Recommendation

Do not use insecure or weak cryptographic algorithms. For example, the Data Encryption Standard (DES) encryption algorithm is considered highly insecure

Do not use Object.equals() to compare cryptographic keys

Cryptographic keys should never be serialized

Technical details

Method com.cloudsinc.welltekmobile.native_v2_welltek.utils.AesUtil.generateKey() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private javax.crypto.SecretKey generateKey(String p8, String p9)
    {
        try {
            return new javax.crypto.spec.SecretKeySpec(javax.crypto.SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1").generateSecret(new javax.crypto.spec.PBEKeySpec(p9.toCharArray(), com.cloudsinc.welltekmobile.native_v2_welltek.utils.AesUtil.hex(p8), this.iterationCount, this.keySize)).getEncoded(), "AES");
        } catch (java.security.spec.InvalidKeySpecException v0) {
            throw this.fail(v0);
        } catch (java.security.spec.InvalidKeySpecException v0) {
        }
    }

Method com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.<clinit>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    static PassowrdEncryptDecrypt()
    {
        javax.crypto.spec.SecretKeySpec v0_0 = new byte[16];
        v0_0 = {48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 97, 98, 99, 100, 101, 102};
        com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.keyValue = v0_0;
        javax.crypto.spec.SecretKeySpec v0_3 = new byte[16];
        v0_3 = {102, 101, 100, 99, 98, 97, 57, 56, 55, 54, 53, 52, 51, 50, 49, 48};
        com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.ivValue = v0_3;
        com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.ivspec = new javax.crypto.spec.IvParameterSpec(com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.ivValue);
        com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.keyspec = new javax.crypto.spec.SecretKeySpec(com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.keyValue, "AES");
        return;
    }

Method okio.Buffer.hmac() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private okio.ByteString hmac(String p8, okio.ByteString p9)
    {
        try {
            javax.crypto.Mac v1 = javax.crypto.Mac.getInstance(p8);
            v1.init(new javax.crypto.spec.SecretKeySpec(p9.toByteArray(), p8));
        } catch (java.security.InvalidKeyException v0) {
            throw new AssertionError();
        } catch (java.security.InvalidKeyException v0) {
            throw new IllegalArgumentException(v0);
        }
        if (this.head != null) {
            v1.update(this.head.data, this.head.pos, (this.head.limit - this.head.pos));
            okio.Segment v2 = this.head.next;
            while (v2 != this.head) {
                v1.update(v2.data, v2.pos, (v2.limit - v2.pos));
                v2 = v2.next;
            }
        }
        return okio.ByteString.of(v1.doFinal());
    }

Method okio.ByteString.hmac() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private okio.ByteString hmac(String p5, okio.ByteString p6)
    {
        try {
            javax.crypto.Mac v1 = javax.crypto.Mac.getInstance(p5);
            v1.init(new javax.crypto.spec.SecretKeySpec(p6.toByteArray(), p5));
            return okio.ByteString.of(v1.doFinal(this.data));
        } catch (java.security.InvalidKeyException v0_1) {
            throw new AssertionError(v0_1);
        } catch (java.security.InvalidKeyException v0_0) {
            throw new IllegalArgumentException(v0_0);
        }
    }

Method okio.HashingSink.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private HashingSink(okio.Sink p5, okio.ByteString p6, String p7)
    {
        super(p5);
        try {
            super.mac = javax.crypto.Mac.getInstance(p7);
            super.mac.init(new javax.crypto.spec.SecretKeySpec(p6.toByteArray(), p7));
            super.messageDigest = 0;
            return;
        } catch (java.security.InvalidKeyException v0) {
            throw new AssertionError();
        } catch (java.security.InvalidKeyException v0) {
            throw new IllegalArgumentException(v0);
        }
    }

Method com.google.android.gms.internal.au.zza() calling method javax.crypto.spec.SecretKeySpec.<init>()


    protected final varargs com.google.android.gms.internal.dp zza(com.google.android.gms.internal.zzcwa p8, com.google.android.gms.internal.dp[] p9)
    {
        String v0_12;
        com.google.android.gms.common.internal.zzbo.zzaf(1);
        if (p9.length < 3) {
            v0_12 = 0;
        } else {
            v0_12 = 1;
        }
        String v0_5;
        com.google.android.gms.common.internal.zzbo.zzaf(v0_12);
        String v2_1 = com.google.android.gms.internal.zzcxp.zzd(p9[0]);
        int v3_0 = com.google.android.gms.internal.zzcxp.zzd(p9[1]);
        String v4 = com.google.android.gms.internal.zzcxp.zzd(p9[2]);
        if (p9.length >= 4) {
            v0_5 = com.google.android.gms.internal.zzcxp.zzd(p9[3]);
        } else {
            v0_5 = "AES/CBC/NoPadding";
        }
        javax.crypto.spec.SecretKeySpec v5_2 = com.google.android.gms.internal.au.zzbKe.matcher(v0_5);
        if (v5_2.matches()) {
            try {
                String v0_8 = com.google.android.gms.internal.au.zza(javax.crypto.Cipher.getInstance(v0_5), v2_1, new javax.crypto.spec.SecretKeySpec(v3_0.getBytes(), v5_2.group(1)), new javax.crypto.spec.IvParameterSpec(v4.getBytes()));
                return new com.google.android.gms.internal.eb(v0_8);
            } catch (RuntimeException v1) {
                String v0_9 = String.valueOf(v0_8);
                if (v0_9.length() == 0) {
                    String v0_11 = new String("Encrypt: invalid transformation:");
                } else {
                    v0_11 = "Encrypt: invalid transformation:".concat(v0_9);
                }
                throw new RuntimeException(v0_11);
            } catch (RuntimeException v1) {
            }
        } else {
            String v0_15;
            String v0_13 = String.valueOf(v0_5);
            if (v0_13.length() == 0) {
                v0_15 = new String("Encrypt: invalid transformation:");
            } else {
                v0_15 = "Encrypt: invalid transformation:".concat(v0_13);
            }
            throw new RuntimeException(v0_15);
        }
    }

Method com.google.android.gms.internal.zzcw.zza() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public final byte[] zza(byte[] p8, String p9)
    {
        if (p8.length == 16) {
            try {
                Throwable v0_12 = com.google.android.gms.internal.zzbt.zza(p9, 0);
            } catch (Throwable v0_16) {
                throw new com.google.android.gms.internal.zzcx(this, v0_16);
            } catch (Throwable v0_15) {
                throw new com.google.android.gms.internal.zzcx(this, v0_15);
            } catch (Throwable v0_14) {
                throw new com.google.android.gms.internal.zzcx(this, v0_14);
            } catch (Throwable v0_13) {
                throw new com.google.android.gms.internal.zzcx(this, v0_13);
            } catch (Throwable v0_11) {
                throw new com.google.android.gms.internal.zzcx(this, v0_11);
            } catch (Throwable v0_10) {
                throw new com.google.android.gms.internal.zzcx(this, v0_10);
            } catch (Throwable v0_9) {
                throw new com.google.android.gms.internal.zzcx(this, v0_9);
            }
            if (v0_12.length > 16) {
                javax.crypto.Cipher v1_0 = java.nio.ByteBuffer.allocate(v0_12.length);
                v1_0.put(v0_12);
                v1_0.flip();
                byte[] v2_2 = new byte[16];
                Throwable v0_3 = new byte[(v0_12.length - 16)];
                v1_0.get(v2_2);
                v1_0.get(v0_3);
                com.google.android.gms.internal.zzcw.getCipher().init(2, new javax.crypto.spec.SecretKeySpec(p8, "AES"), new javax.crypto.spec.IvParameterSpec(v2_2));
                return com.google.android.gms.internal.zzcw.getCipher().doFinal(v0_3);
            } else {
                throw new com.google.android.gms.internal.zzcx(this);
            }
        } else {
            throw new com.google.android.gms.internal.zzcx(this);
        }
    }

Method com.google.android.gms.internal.zzcw.zzc() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public final String zzc(byte[] p6, byte[] p7)
    {
        if (p6.length == 16) {
            try {
            } catch (String v0_12) {
                throw new com.google.android.gms.internal.zzcx(this, v0_12);
            } catch (String v0_10) {
                throw new com.google.android.gms.internal.zzcx(this, v0_10);
            } catch (String v0_9) {
                throw new com.google.android.gms.internal.zzcx(this, v0_9);
            } catch (String v0_8) {
                throw new com.google.android.gms.internal.zzcx(this, v0_8);
            } catch (String v0_7) {
                throw new com.google.android.gms.internal.zzcx(this, v0_7);
            }
            com.google.android.gms.internal.zzcw.getCipher().init(1, new javax.crypto.spec.SecretKeySpec(p6, "AES"), 0);
            String v0_2 = com.google.android.gms.internal.zzcw.getCipher().doFinal(p7);
            java.nio.ByteBuffer v2_1 = com.google.android.gms.internal.zzcw.getCipher().getIV();
            int v1_2 = (v0_2.length + v2_1.length);
            java.nio.ByteBuffer v3_1 = java.nio.ByteBuffer.allocate(v1_2);
            v3_1.put(v2_1).put(v0_2);
            v3_1.flip();
            String v0_5 = new byte[v1_2];
            v3_1.get(v0_5);
            return com.google.android.gms.internal.zzbt.zza(v0_5, 0);
        } else {
            throw new com.google.android.gms.internal.zzcx(this);
        }
    }

Method okio.HashingSource.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private HashingSource(okio.Source p5, okio.ByteString p6, String p7)
    {
        super(p5);
        try {
            super.mac = javax.crypto.Mac.getInstance(p7);
            super.mac.init(new javax.crypto.spec.SecretKeySpec(p6.toByteArray(), p7));
            super.messageDigest = 0;
            return;
        } catch (java.security.InvalidKeyException v0) {
            throw new AssertionError();
        } catch (java.security.InvalidKeyException v0) {
            throw new IllegalArgumentException(v0);
        }
    }

Method com.cloudsinc.welltekmobile.native_v2_welltek.utils.AesUtil.doFinal() calling method javax.crypto.Cipher.doFinal()


    private byte[] doFinal(int p5, javax.crypto.SecretKey p6, String p7, byte[] p8)
    {
        try {
            this.cipher.init(p5, p6, new javax.crypto.spec.IvParameterSpec(com.cloudsinc.welltekmobile.native_v2_welltek.utils.AesUtil.hex(p7)));
            return this.cipher.doFinal(p8);
        } catch (javax.crypto.BadPaddingException v0) {
            throw this.fail(v0);
        } catch (javax.crypto.BadPaddingException v0) {
        } catch (javax.crypto.BadPaddingException v0) {
        } catch (javax.crypto.BadPaddingException v0) {
        }
    }

Method com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.decrypt() calling method javax.crypto.Cipher.doFinal()


    public static String decrypt(String p7)
    {
        javax.crypto.Cipher v0 = javax.crypto.Cipher.getInstance("AES/CBC/NoPadding");
        v0.init(2, com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.keyspec, com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.ivspec);
        return new String(v0.doFinal(android.util.Base64.decode(p7, 0)));
    }

Method com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.encrypt() calling method javax.crypto.Cipher.doFinal()


    public static String encrypt(String p6)
    {
        javax.crypto.Cipher v0 = javax.crypto.Cipher.getInstance("AES/CBC/NoPadding");
        v0.init(1, com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.keyspec, com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.ivspec);
        return new String(android.util.Base64.encode(v0.doFinal(com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.padString(p6).getBytes()), 0)).replaceFirst("\n", "");
    }

Method com.google.android.gms.internal.au.zza() calling method javax.crypto.Cipher.doFinal()


    private static String zza(javax.crypto.Cipher p4, String p5, javax.crypto.spec.SecretKeySpec p6, javax.crypto.spec.IvParameterSpec p7)
    {
        if ((p5 != null) && (p5.length() != 0)) {
            try {
                p4.init(1, p6, p7);
                return com.google.android.gms.internal.zzcue.encode(p4.doFinal(p5.getBytes()));
            } catch (String v0_1) {
                String v0_3 = String.valueOf(v0_1.getMessage());
                if (v0_3.length() == 0) {
                    String v0_6 = new String("Encrypt: ");
                } else {
                    v0_6 = "Encrypt: ".concat(v0_3);
                }
                throw new RuntimeException(v0_6);
            }
        } else {
            throw new RuntimeException("Encrypt: empty input string");
        }
    }

Method com.google.android.gms.internal.zzcw.zza() calling method javax.crypto.Cipher.doFinal()


    public final byte[] zza(byte[] p8, String p9)
    {
        if (p8.length == 16) {
            try {
                Throwable v0_12 = com.google.android.gms.internal.zzbt.zza(p9, 0);
            } catch (Throwable v0_16) {
                throw new com.google.android.gms.internal.zzcx(this, v0_16);
            } catch (Throwable v0_15) {
                throw new com.google.android.gms.internal.zzcx(this, v0_15);
            } catch (Throwable v0_14) {
                throw new com.google.android.gms.internal.zzcx(this, v0_14);
            } catch (Throwable v0_13) {
                throw new com.google.android.gms.internal.zzcx(this, v0_13);
            } catch (Throwable v0_11) {
                throw new com.google.android.gms.internal.zzcx(this, v0_11);
            } catch (Throwable v0_10) {
                throw new com.google.android.gms.internal.zzcx(this, v0_10);
            } catch (Throwable v0_9) {
                throw new com.google.android.gms.internal.zzcx(this, v0_9);
            }
            if (v0_12.length > 16) {
                javax.crypto.Cipher v1_0 = java.nio.ByteBuffer.allocate(v0_12.length);
                v1_0.put(v0_12);
                v1_0.flip();
                byte[] v2_2 = new byte[16];
                Throwable v0_3 = new byte[(v0_12.length - 16)];
                v1_0.get(v2_2);
                v1_0.get(v0_3);
                com.google.android.gms.internal.zzcw.getCipher().init(2, new javax.crypto.spec.SecretKeySpec(p8, "AES"), new javax.crypto.spec.IvParameterSpec(v2_2));
                return com.google.android.gms.internal.zzcw.getCipher().doFinal(v0_3);
            } else {
                throw new com.google.android.gms.internal.zzcx(this);
            }
        } else {
            throw new com.google.android.gms.internal.zzcx(this);
        }
    }

Method com.google.android.gms.internal.zzcw.zzc() calling method javax.crypto.Cipher.doFinal()


    public final String zzc(byte[] p6, byte[] p7)
    {
        if (p6.length == 16) {
            try {
            } catch (String v0_12) {
                throw new com.google.android.gms.internal.zzcx(this, v0_12);
            } catch (String v0_10) {
                throw new com.google.android.gms.internal.zzcx(this, v0_10);
            } catch (String v0_9) {
                throw new com.google.android.gms.internal.zzcx(this, v0_9);
            } catch (String v0_8) {
                throw new com.google.android.gms.internal.zzcx(this, v0_8);
            } catch (String v0_7) {
                throw new com.google.android.gms.internal.zzcx(this, v0_7);
            }
            com.google.android.gms.internal.zzcw.getCipher().init(1, new javax.crypto.spec.SecretKeySpec(p6, "AES"), 0);
            String v0_2 = com.google.android.gms.internal.zzcw.getCipher().doFinal(p7);
            java.nio.ByteBuffer v2_1 = com.google.android.gms.internal.zzcw.getCipher().getIV();
            int v1_2 = (v0_2.length + v2_1.length);
            java.nio.ByteBuffer v3_1 = java.nio.ByteBuffer.allocate(v1_2);
            v3_1.put(v2_1).put(v0_2);
            v3_1.flip();
            String v0_5 = new byte[v1_2];
            v3_1.get(v0_5);
            return com.google.android.gms.internal.zzbt.zza(v0_5, 0);
        } else {
            throw new com.google.android.gms.internal.zzcx(this);
        }
    }

Method com.google.android.gms.internal.zzcw.zzc() calling method javax.crypto.Cipher.getIV()


    public final String zzc(byte[] p6, byte[] p7)
    {
        if (p6.length == 16) {
            try {
            } catch (String v0_12) {
                throw new com.google.android.gms.internal.zzcx(this, v0_12);
            } catch (String v0_10) {
                throw new com.google.android.gms.internal.zzcx(this, v0_10);
            } catch (String v0_9) {
                throw new com.google.android.gms.internal.zzcx(this, v0_9);
            } catch (String v0_8) {
                throw new com.google.android.gms.internal.zzcx(this, v0_8);
            } catch (String v0_7) {
                throw new com.google.android.gms.internal.zzcx(this, v0_7);
            }
            com.google.android.gms.internal.zzcw.getCipher().init(1, new javax.crypto.spec.SecretKeySpec(p6, "AES"), 0);
            String v0_2 = com.google.android.gms.internal.zzcw.getCipher().doFinal(p7);
            java.nio.ByteBuffer v2_1 = com.google.android.gms.internal.zzcw.getCipher().getIV();
            int v1_2 = (v0_2.length + v2_1.length);
            java.nio.ByteBuffer v3_1 = java.nio.ByteBuffer.allocate(v1_2);
            v3_1.put(v2_1).put(v0_2);
            v3_1.flip();
            String v0_5 = new byte[v1_2];
            v3_1.get(v0_5);
            return com.google.android.gms.internal.zzbt.zza(v0_5, 0);
        } else {
            throw new com.google.android.gms.internal.zzcx(this);
        }
    }

Method com.cloudsinc.welltekmobile.native_v2_welltek.utils.AesUtil.<init>() calling method javax.crypto.Cipher.getInstance()


    public AesUtil(int p3, int p4)
    {
        this.keySize = p3;
        this.iterationCount = p4;
        try {
            this.cipher = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5Padding");
            return;
        } catch (javax.crypto.NoSuchPaddingException v0) {
            throw this.fail(v0);
        } catch (javax.crypto.NoSuchPaddingException v0) {
        }
    }

Method com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.decrypt() calling method javax.crypto.Cipher.getInstance()


    public static String decrypt(String p7)
    {
        javax.crypto.Cipher v0 = javax.crypto.Cipher.getInstance("AES/CBC/NoPadding");
        v0.init(2, com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.keyspec, com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.ivspec);
        return new String(v0.doFinal(android.util.Base64.decode(p7, 0)));
    }

Method com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.encrypt() calling method javax.crypto.Cipher.getInstance()


    public static String encrypt(String p6)
    {
        javax.crypto.Cipher v0 = javax.crypto.Cipher.getInstance("AES/CBC/NoPadding");
        v0.init(1, com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.keyspec, com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.ivspec);
        return new String(android.util.Base64.encode(v0.doFinal(com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.padString(p6).getBytes()), 0)).replaceFirst("\n", "");
    }

Method com.google.android.gms.internal.au.zza() calling method javax.crypto.Cipher.getInstance()


    protected final varargs com.google.android.gms.internal.dp zza(com.google.android.gms.internal.zzcwa p8, com.google.android.gms.internal.dp[] p9)
    {
        String v0_12;
        com.google.android.gms.common.internal.zzbo.zzaf(1);
        if (p9.length < 3) {
            v0_12 = 0;
        } else {
            v0_12 = 1;
        }
        String v0_5;
        com.google.android.gms.common.internal.zzbo.zzaf(v0_12);
        String v2_1 = com.google.android.gms.internal.zzcxp.zzd(p9[0]);
        int v3_0 = com.google.android.gms.internal.zzcxp.zzd(p9[1]);
        String v4 = com.google.android.gms.internal.zzcxp.zzd(p9[2]);
        if (p9.length >= 4) {
            v0_5 = com.google.android.gms.internal.zzcxp.zzd(p9[3]);
        } else {
            v0_5 = "AES/CBC/NoPadding";
        }
        javax.crypto.spec.SecretKeySpec v5_2 = com.google.android.gms.internal.au.zzbKe.matcher(v0_5);
        if (v5_2.matches()) {
            try {
                String v0_8 = com.google.android.gms.internal.au.zza(javax.crypto.Cipher.getInstance(v0_5), v2_1, new javax.crypto.spec.SecretKeySpec(v3_0.getBytes(), v5_2.group(1)), new javax.crypto.spec.IvParameterSpec(v4.getBytes()));
                return new com.google.android.gms.internal.eb(v0_8);
            } catch (RuntimeException v1) {
                String v0_9 = String.valueOf(v0_8);
                if (v0_9.length() == 0) {
                    String v0_11 = new String("Encrypt: invalid transformation:");
                } else {
                    v0_11 = "Encrypt: invalid transformation:".concat(v0_9);
                }
                throw new RuntimeException(v0_11);
            } catch (RuntimeException v1) {
            }
        } else {
            String v0_15;
            String v0_13 = String.valueOf(v0_5);
            if (v0_13.length() == 0) {
                v0_15 = new String("Encrypt: invalid transformation:");
            } else {
                v0_15 = "Encrypt: invalid transformation:".concat(v0_13);
            }
            throw new RuntimeException(v0_15);
        }
    }

Method com.google.android.gms.internal.zzcw.getCipher() calling method javax.crypto.Cipher.getInstance()


    private static javax.crypto.Cipher getCipher()
    {
        try {
            if (com.google.android.gms.internal.zzcw.zzqv == null) {
                com.google.android.gms.internal.zzcw.zzqv = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5Padding");
            }
        } catch (javax.crypto.Cipher v0_4) {
            throw v0_4;
        }
        return com.google.android.gms.internal.zzcw.zzqv;
    }

Method com.cloudsinc.welltekmobile.native_v2_welltek.utils.AesUtil.doFinal() calling method javax.crypto.spec.IvParameterSpec.<init>()


    private byte[] doFinal(int p5, javax.crypto.SecretKey p6, String p7, byte[] p8)
    {
        try {
            this.cipher.init(p5, p6, new javax.crypto.spec.IvParameterSpec(com.cloudsinc.welltekmobile.native_v2_welltek.utils.AesUtil.hex(p7)));
            return this.cipher.doFinal(p8);
        } catch (javax.crypto.BadPaddingException v0) {
            throw this.fail(v0);
        } catch (javax.crypto.BadPaddingException v0) {
        } catch (javax.crypto.BadPaddingException v0) {
        } catch (javax.crypto.BadPaddingException v0) {
        }
    }

Method com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.<clinit>() calling method javax.crypto.spec.IvParameterSpec.<init>()


    static PassowrdEncryptDecrypt()
    {
        javax.crypto.spec.SecretKeySpec v0_0 = new byte[16];
        v0_0 = {48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 97, 98, 99, 100, 101, 102};
        com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.keyValue = v0_0;
        javax.crypto.spec.SecretKeySpec v0_3 = new byte[16];
        v0_3 = {102, 101, 100, 99, 98, 97, 57, 56, 55, 54, 53, 52, 51, 50, 49, 48};
        com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.ivValue = v0_3;
        com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.ivspec = new javax.crypto.spec.IvParameterSpec(com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.ivValue);
        com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.keyspec = new javax.crypto.spec.SecretKeySpec(com.cloudsinc.welltekmobile.native_v2_welltek.utils.PassowrdEncryptDecrypt.keyValue, "AES");
        return;
    }

Method com.google.android.gms.internal.au.zza() calling method javax.crypto.spec.IvParameterSpec.<init>()


    protected final varargs com.google.android.gms.internal.dp zza(com.google.android.gms.internal.zzcwa p8, com.google.android.gms.internal.dp[] p9)
    {
        String v0_12;
        com.google.android.gms.common.internal.zzbo.zzaf(1);
        if (p9.length < 3) {
            v0_12 = 0;
        } else {
            v0_12 = 1;
        }
        String v0_5;
        com.google.android.gms.common.internal.zzbo.zzaf(v0_12);
        String v2_1 = com.google.android.gms.internal.zzcxp.zzd(p9[0]);
        int v3_0 = com.google.android.gms.internal.zzcxp.zzd(p9[1]);
        String v4 = com.google.android.gms.internal.zzcxp.zzd(p9[2]);
        if (p9.length >= 4) {
            v0_5 = com.google.android.gms.internal.zzcxp.zzd(p9[3]);
        } else {
            v0_5 = "AES/CBC/NoPadding";
        }
        javax.crypto.spec.SecretKeySpec v5_2 = com.google.android.gms.internal.au.zzbKe.matcher(v0_5);
        if (v5_2.matches()) {
            try {
                String v0_8 = com.google.android.gms.internal.au.zza(javax.crypto.Cipher.getInstance(v0_5), v2_1, new javax.crypto.spec.SecretKeySpec(v3_0.getBytes(), v5_2.group(1)), new javax.crypto.spec.IvParameterSpec(v4.getBytes()));
                return new com.google.android.gms.internal.eb(v0_8);
            } catch (RuntimeException v1) {
                String v0_9 = String.valueOf(v0_8);
                if (v0_9.length() == 0) {
                    String v0_11 = new String("Encrypt: invalid transformation:");
                } else {
                    v0_11 = "Encrypt: invalid transformation:".concat(v0_9);
                }
                throw new RuntimeException(v0_11);
            } catch (RuntimeException v1) {
            }
        } else {
            String v0_15;
            String v0_13 = String.valueOf(v0_5);
            if (v0_13.length() == 0) {
                v0_15 = new String("Encrypt: invalid transformation:");
            } else {
                v0_15 = "Encrypt: invalid transformation:".concat(v0_13);
            }
            throw new RuntimeException(v0_15);
        }
    }

Method com.google.android.gms.internal.zzcw.zza() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public final byte[] zza(byte[] p8, String p9)
    {
        if (p8.length == 16) {
            try {
                Throwable v0_12 = com.google.android.gms.internal.zzbt.zza(p9, 0);
            } catch (Throwable v0_16) {
                throw new com.google.android.gms.internal.zzcx(this, v0_16);
            } catch (Throwable v0_15) {
                throw new com.google.android.gms.internal.zzcx(this, v0_15);
            } catch (Throwable v0_14) {
                throw new com.google.android.gms.internal.zzcx(this, v0_14);
            } catch (Throwable v0_13) {
                throw new com.google.android.gms.internal.zzcx(this, v0_13);
            } catch (Throwable v0_11) {
                throw new com.google.android.gms.internal.zzcx(this, v0_11);
            } catch (Throwable v0_10) {
                throw new com.google.android.gms.internal.zzcx(this, v0_10);
            } catch (Throwable v0_9) {
                throw new com.google.android.gms.internal.zzcx(this, v0_9);
            }
            if (v0_12.length > 16) {
                javax.crypto.Cipher v1_0 = java.nio.ByteBuffer.allocate(v0_12.length);
                v1_0.put(v0_12);
                v1_0.flip();
                byte[] v2_2 = new byte[16];
                Throwable v0_3 = new byte[(v0_12.length - 16)];
                v1_0.get(v2_2);
                v1_0.get(v0_3);
                com.google.android.gms.internal.zzcw.getCipher().init(2, new javax.crypto.spec.SecretKeySpec(p8, "AES"), new javax.crypto.spec.IvParameterSpec(v2_2));
                return com.google.android.gms.internal.zzcw.getCipher().doFinal(v0_3);
            } else {
                throw new com.google.android.gms.internal.zzcx(this);
            }
        } else {
            throw new com.google.android.gms.internal.zzcx(this);
        }
    }