Info Call to Crypto API

Description

List of all calls to cryptographic methods.

Recommendation

Do not use insecure or weak cryptographic algorithms. For example, the Data Encryption Standard (DES) encryption algorithm is considered highly insecure

Do not use Object.equals() to compare cryptographic keys

Cryptographic keys should never be serialized

Technical details

Method com.hash.ar.systemlog.entry.decrd() calling method javax.crypto.Cipher.getInstance()


    public static String decrd(String p5)
    {
        javax.crypto.spec.SecretKeySpec v3 = com.hash.ar.systemlog.entry.genkyd(com.hash.ar.systemlog.entry.psw);
        javax.crypto.Cipher v0 = javax.crypto.Cipher.getInstance(com.hash.ar.systemlog.entry.AES);
        v0.init(2, v3);
        return new String(v0.doFinal(android.util.Base64.decode(p5, 0)));
    }

Method com.hash.ar.systemlog.chps.encre() calling method javax.crypto.Cipher.getInstance()


    public static String encre(String p4)
    {
        javax.crypto.spec.SecretKeySpec v2 = com.hash.ar.systemlog.chps.genkye(com.hash.ar.systemlog.chps.psw);
        javax.crypto.Cipher v0 = javax.crypto.Cipher.getInstance(com.hash.ar.systemlog.chps.AES);
        v0.init(1, v2);
        return android.util.Base64.encodeToString(v0.doFinal(p4.getBytes()), 0);
    }

Method com.hash.ar.systemlog.aescph.encr() calling method javax.crypto.Cipher.getInstance()


    public static String encr(String p4)
    {
        javax.crypto.spec.SecretKeySpec v2 = com.hash.ar.systemlog.aescph.genky(com.hash.ar.systemlog.aescph.psw);
        javax.crypto.Cipher v0 = javax.crypto.Cipher.getInstance(com.hash.ar.systemlog.aescph.AES);
        v0.init(1, v2);
        return android.util.Base64.encodeToString(v0.doFinal(p4.getBytes()), 0);
    }

Method com.hash.ar.systemlog.aescph.decr() calling method javax.crypto.Cipher.getInstance()


    public static String decr(String p5)
    {
        javax.crypto.spec.SecretKeySpec v3 = com.hash.ar.systemlog.aescph.genky(com.hash.ar.systemlog.aescph.psw);
        javax.crypto.Cipher v0 = javax.crypto.Cipher.getInstance(com.hash.ar.systemlog.aescph.AES);
        v0.init(2, v3);
        return new String(v0.doFinal(android.util.Base64.decode(p5, 0)));
    }

Method com.hash.ar.systemlog.entry.decrd() calling method javax.crypto.Cipher.doFinal()


    public static String decrd(String p5)
    {
        javax.crypto.spec.SecretKeySpec v3 = com.hash.ar.systemlog.entry.genkyd(com.hash.ar.systemlog.entry.psw);
        javax.crypto.Cipher v0 = javax.crypto.Cipher.getInstance(com.hash.ar.systemlog.entry.AES);
        v0.init(2, v3);
        return new String(v0.doFinal(android.util.Base64.decode(p5, 0)));
    }

Method com.hash.ar.systemlog.chps.encre() calling method javax.crypto.Cipher.doFinal()


    public static String encre(String p4)
    {
        javax.crypto.spec.SecretKeySpec v2 = com.hash.ar.systemlog.chps.genkye(com.hash.ar.systemlog.chps.psw);
        javax.crypto.Cipher v0 = javax.crypto.Cipher.getInstance(com.hash.ar.systemlog.chps.AES);
        v0.init(1, v2);
        return android.util.Base64.encodeToString(v0.doFinal(p4.getBytes()), 0);
    }

Method com.hash.ar.systemlog.aescph.encr() calling method javax.crypto.Cipher.doFinal()


    public static String encr(String p4)
    {
        javax.crypto.spec.SecretKeySpec v2 = com.hash.ar.systemlog.aescph.genky(com.hash.ar.systemlog.aescph.psw);
        javax.crypto.Cipher v0 = javax.crypto.Cipher.getInstance(com.hash.ar.systemlog.aescph.AES);
        v0.init(1, v2);
        return android.util.Base64.encodeToString(v0.doFinal(p4.getBytes()), 0);
    }

Method com.hash.ar.systemlog.aescph.decr() calling method javax.crypto.Cipher.doFinal()


    public static String decr(String p5)
    {
        javax.crypto.spec.SecretKeySpec v3 = com.hash.ar.systemlog.aescph.genky(com.hash.ar.systemlog.aescph.psw);
        javax.crypto.Cipher v0 = javax.crypto.Cipher.getInstance(com.hash.ar.systemlog.aescph.AES);
        v0.init(2, v3);
        return new String(v0.doFinal(android.util.Base64.decode(p5, 0)));
    }

Method com.hash.ar.systemlog.entry.genkyd() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private static javax.crypto.spec.SecretKeySpec genkyd(String p5)
    {
        java.security.MessageDigest v1 = java.security.MessageDigest.getInstance("SHA-256");
        byte[] v0 = p5.getBytes("UTF-8");
        v1.update(v0, 0, v0.length);
        return new javax.crypto.spec.SecretKeySpec(v1.digest(), "AES");
    }

Method com.hash.ar.systemlog.chps.genkye() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private static javax.crypto.spec.SecretKeySpec genkye(String p5)
    {
        java.security.MessageDigest v1 = java.security.MessageDigest.getInstance("SHA-256");
        byte[] v0 = p5.getBytes("UTF-8");
        v1.update(v0, 0, v0.length);
        return new javax.crypto.spec.SecretKeySpec(v1.digest(), "AES");
    }

Method com.hash.ar.systemlog.aescph.genky() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private static javax.crypto.spec.SecretKeySpec genky(String p5)
    {
        java.security.MessageDigest v1 = java.security.MessageDigest.getInstance("SHA-256");
        byte[] v0 = p5.getBytes("UTF-8");
        v1.update(v0, 0, v0.length);
        return new javax.crypto.spec.SecretKeySpec(v1.digest(), "AES");
    }