Info Call to Random API

Description

List of all calls to methods that return pseudo-random values.

Recommendation

Do not seed Random with the current time because that value is more predictable to an attacker than the default seed.

The java.util.Random class must not be used either for security-critical applications or for protecting sensitive data. Use a more secure random number generator, such as the java.security.SecureRandom class.

Technical details

Method org.spongycastle.pqc.math.linearalgebra.GF2nPolynomialElement.solveQuadraticEquation() calling method java.util.Random.<init>()


    public org.spongycastle.pqc.math.linearalgebra.GF2nElement solveQuadraticEquation()
    {
        if (!this.isZero()) {
            if ((this.mDegree & 1) == 1) {
                return this.halfTrace();
            }
            do {
                RuntimeException v0_1 = new org.spongycastle.pqc.math.linearalgebra.GF2nPolynomialElement(((org.spongycastle.pqc.math.linearalgebra.GF2nPolynomialField) this.mField), new java.util.Random());
                org.spongycastle.pqc.math.linearalgebra.GF2nPolynomialElement v2_2 = org.spongycastle.pqc.math.linearalgebra.GF2nPolynomialElement.ZERO(((org.spongycastle.pqc.math.linearalgebra.GF2nPolynomialField) this.mField));
                org.spongycastle.pqc.math.linearalgebra.GF2nPolynomialElement v3_3 = ((org.spongycastle.pqc.math.linearalgebra.GF2nPolynomialElement) v0_1.clone());
                int v4 = 1;
                if (v4 >= this.mDegree) {
                } else {
                    v2_2.squareThis();
                    v3_3.squareThis();
                    v2_2.addToThis(v3_3.multiply(this));
                    v3_3.addToThis(v0_1);
                    v4++;
                    while (v4 < this.mDegree) {
                    }
                }
            } while(v3_3.isZero());
            if (!this.equals(v2_2.square().add(v2_2))) {
                throw new RuntimeException();
            } else {
                return v2_2;
            }
        } else {
            return org.spongycastle.pqc.math.linearalgebra.GF2nPolynomialElement.ZERO(((org.spongycastle.pqc.math.linearalgebra.GF2nPolynomialField) this.mField));
        }
    }

Method org.spongycastle.pqc.math.linearalgebra.GF2nONBField.elementOfOrder() calling method java.util.Random.<init>()


    private int elementOfOrder(int p5, int p6)
    {
        int v0_1 = new java.util.Random();
        int v1_0 = 0;
        while (v1_0 == 0) {
            int v2_2 = (p6 - 1);
            v1_0 = (v0_1.nextInt() % v2_2);
            if (v1_0 < 0) {
                v1_0 += v2_2;
            }
        }
        int v2_0 = org.spongycastle.pqc.math.linearalgebra.IntegerFunctions.order(v1_0, p6);
        while (((v2_0 % p5) != 0) || (v2_0 == 0)) {
            while (v1_0 == 0) {
                int v2_1 = (p6 - 1);
                v1_0 = (v0_1.nextInt() % v2_1);
                if (v1_0 < 0) {
                    v1_0 += v2_1;
                }
            }
            v2_0 = org.spongycastle.pqc.math.linearalgebra.IntegerFunctions.order(v1_0, p6);
        }
        int v6_1 = 2;
        int v0_2 = v1_0;
        while (v6_1 <= (p5 / v2_0)) {
            v0_2 *= v1_0;
            v6_1++;
        }
        return v0_2;
    }

Method org.spongycastle.pqc.math.linearalgebra.GF2Polynomial.<clinit>() calling method java.util.Random.<init>()


    static GF2Polynomial()
    {
        org.spongycastle.pqc.math.linearalgebra.GF2Polynomial.rand = new java.util.Random();
        int[] v1_1 = new boolean[256];
        v1_1 = {0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0, 1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1, 0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0, 1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1, 0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0, 1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1, 0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0, 1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1, 0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0, 1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0, 0, 1, 1, 0, 1, 0, 0, 1, 0, 1, 1, 0, 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 1, 0};
        org.spongycastle.pqc.math.linearalgebra.GF2Polynomial.parity = v1_1;
        int[] v0_5 = new short[256];
        v0_5 = {0, 1, 4, 5, 16, 17, 20, 21, 64, 65, 68, 69, 80, 81, 84, 85, 256, 257, 260, 261, 272, 273, 276, 277, 320, 321, 324, 325, 336, 337, 340, 341, 1024, 1025, 1028, 1029, 1040, 1041, 1044, 1045, 1088, 1089, 1092, 1093, 1104, 1105, 1108, 1109, 1280, 1281, 1284, 1285, 1296, 1297, 1300, 1301, 1344, 1345, 1348, 1349, 1360, 1361, 1364, 1365, 4096, 4097, 4100, 4101, 4112, 4113, 4116, 4117, 4160, 4161, 4164, 4165, 4176, 4177, 4180, 4181, 4352, 4353, 4356, 4357, 4368, 4369, 4372, 4373, 4416, 4417, 4420, 4421, 4432, 4433, 4436, 4437, 5120, 5121, 5124, 5125, 5136, 5137, 5140, 5141, 5184, 5185, 5188, 5189, 5200, 5201, 5204, 5205, 5376, 5377, 5380, 5381, 5392, 5393, 5396, 5397, 5440, 5441, 5444, 5445, 5456, 5457, 5460, 5461, 16384, 16385, 16388, 16389, 16400, 16401, 16404, 16405, 16448, 16449, 16452, 16453, 16464, 16465, 16468, 16469, 16640, 16641, 16644, 16645, 16656, 16657, 16660, 16661, 16704, 16705, 16708, 16709, 16720, 16721, 16724, 16725, 17408, 17409, 17412, 17413, 17424, 17425, 17428, 17429, 17472, 17473, 17476, 17477, 17488, 17489, 17492, 17493, 17664, 17665, 17668, 17669, 17680, 17681, 17684, 17685, 17728, 17729, 17732, 17733, 17744, 17745, 17748, 17749, 20480, 20481, 20484, 20485, 20496, 20497, 20500, 20501, 20544, 20545, 20548, 20549, 20560, 20561, 20564, 20565, 20736, 20737, 20740, 20741, 20752, 20753, 20756, 20757, 20800, 20801, 20804, 20805, 20816, 20817, 20820, 20821, 21504, 21505, 21508, 21509, 21520, 21521, 21524, 21525, 21568, 21569, 21572, 21573, 21584, 21585, 21588, 21589, 21760, 21761, 21764, 21765, 21776, 21777, 21780, 21781, 21824, 21825, 21828, 21829, 21840, 21841, 21844, 21845};
        org.spongycastle.pqc.math.linearalgebra.GF2Polynomial.squaringTable = v0_5;
        int[] v1_0 = new int[33];
        v1_0 = {1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1024, 2048, 4096, 8192, 16384, 32768, 65536, 131072, 262144, 524288, 1048576, 2097152, 4194304, 8388608, 16777216, 33554432, 67108864, 134217728, 268435456, 536870912, 1073741824, -2147483648, 0};
        org.spongycastle.pqc.math.linearalgebra.GF2Polynomial.bitMask = v1_0;
        int[] v0_3 = new int[33];
        v0_3 = {0, 1, 3, 7, 15, 31, 63, 127, 255, 511, 1023, 2047, 4095, 8191, 16383, 32767, 65535, 131071, 262143, 524287, 1048575, 2097151, 4194303, 8388607, 16777215, 33554431, 67108863, 134217727, 268435455, 536870911, 1073741823, 2147483647, -1};
        org.spongycastle.pqc.math.linearalgebra.GF2Polynomial.reverseRightMask = v0_3;
        return;
    }

Method org.spongycastle.math.ec.ECFieldElement$Fp.sqrt() calling method java.util.Random.<init>()


    public org.spongycastle.math.ec.ECFieldElement sqrt()
    {
        if ((!this.isZero()) && (!this.isOne())) {
            if (!this.q.testBit(0)) {
                throw new RuntimeException("not done yet");
            } else {
                if (!this.q.testBit(1)) {
                    if (!this.q.testBit(2)) {
                        org.spongycastle.math.ec.ECFieldElement$Fp v0_23 = this.q.shiftRight(1);
                        if (this.x.modPow(v0_23, this.q).equals(org.spongycastle.math.ec.ECConstants.ONE)) {
                            java.math.BigInteger v3_8 = this.x;
                            java.math.BigInteger v5_1 = this.modDouble(this.modDouble(v3_8));
                            java.math.BigInteger v6_1 = v0_23.add(org.spongycastle.math.ec.ECConstants.ONE);
                            java.math.BigInteger v7_1 = this.q.subtract(org.spongycastle.math.ec.ECConstants.ONE);
                            java.util.Random v8_2 = new java.util.Random();
                            do {
                                boolean v9_1 = new java.math.BigInteger(this.q.bitLength(), v8_2);
                                if ((v9_1.compareTo(this.q) < 0) && (this.modReduce(v9_1.multiply(v9_1).subtract(v5_1)).modPow(v0_23, this.q).equals(v7_1))) {
                                    boolean v9_2 = this.lucasSequence(v9_1, v3_8, v6_1);
                                    java.math.BigInteger v10_9 = v9_2[0];
                                    boolean v9_3 = v9_2[1];
                                    if (!this.modMult(v9_3, v9_3).equals(v5_1)) {
                                    } else {
                                        return new org.spongycastle.math.ec.ECFieldElement$Fp(this.q, this.r, this.modHalfAbs(v9_3));
                                    }
                                }
                            } while((v10_9.equals(org.spongycastle.math.ec.ECConstants.ONE)) || (v10_9.equals(v7_1)));
                            return 0;
                        } else {
                            return 0;
                        }
                    } else {
                        org.spongycastle.math.ec.ECFieldElement$Fp v0_1 = this.x.modPow(this.q.shiftRight(3), this.q);
                        java.math.BigInteger v1_2 = this.modMult(v0_1, this.x);
                        if (!this.modMult(v1_2, v0_1).equals(org.spongycastle.math.ec.ECConstants.ONE)) {
                            return this.checkSqrt(new org.spongycastle.math.ec.ECFieldElement$Fp(this.q, this.r, this.modMult(v1_2, org.spongycastle.math.ec.ECConstants.TWO.modPow(this.q.shiftRight(2), this.q))));
                        } else {
                            return this.checkSqrt(new org.spongycastle.math.ec.ECFieldElement$Fp(this.q, this.r, v1_2));
                        }
                    }
                } else {
                    java.math.BigInteger v2_6 = this.q;
                    return this.checkSqrt(new org.spongycastle.math.ec.ECFieldElement$Fp(v2_6, this.r, this.x.modPow(this.q.shiftRight(2).add(org.spongycastle.math.ec.ECConstants.ONE), v2_6)));
                }
            }
        } else {
            return this;
        }
    }

Method org.spongycastle.math.ec.ECCurve$AbstractF2m.solveQuadraticEquation() calling method java.util.Random.<init>()


    private org.spongycastle.math.ec.ECFieldElement solveQuadraticEquation(org.spongycastle.math.ec.ECFieldElement p9)
    {
        if (!p9.isZero()) {
            org.spongycastle.math.ec.ECFieldElement v0_2 = this.fromBigInteger(org.spongycastle.math.ec.ECConstants.ZERO);
            int v1 = this.getFieldSize();
            java.util.Random v2_1 = new java.util.Random();
            do {
                boolean v3_2 = this.fromBigInteger(new java.math.BigInteger(v1, v2_1));
                int v4 = 1;
                org.spongycastle.math.ec.ECFieldElement v5_0 = p9;
                org.spongycastle.math.ec.ECFieldElement v6_0 = v0_2;
                if (v4 >= v1) {
                    if (v5_0.isZero()) {
                    } else {
                        return 0;
                    }
                } else {
                    org.spongycastle.math.ec.ECFieldElement v5_1 = v5_0.square();
                    v6_0 = v6_0.square().add(v5_1.multiply(v3_2));
                    v5_0 = v5_1.add(p9);
                    v4++;
                    while (v4 < v1) {
                    }
                }
            } while(v6_0.square().add(v6_0).isZero());
            return v6_0;
        } else {
            return p9;
        }
    }

Method org.spongycastle.math.raw.Mod.random() calling method java.util.Random.<init>()


    public static int[] random(int[] p7)
    {
        int v0 = p7.length;
        java.util.Random v1_1 = new java.util.Random();
        int[] v2 = org.spongycastle.math.raw.Nat.create(v0);
        int v3 = (v0 - 1);
        int v4_4 = p7[v3];
        int v4_5 = (v4_4 | (v4_4 >> 1));
        int v4_0 = (v4_5 | (v4_5 >> 2));
        int v4_1 = (v4_0 | (v4_0 >> 4));
        int v4_2 = (v4_1 | (v4_1 >> 8));
        int v4_3 = (v4_2 | (v4_2 >> 16));
        do {
            boolean v5_3 = 0;
            if (v5_3 == v0) {
                v2[v3] = (v2[v3] & v4_3);
            } else {
                v2[v5_3] = v1_1.nextInt();
                v5_3++;
                while (v5_3 != v0) {
                }
            }
        } while(org.spongycastle.math.raw.Nat.gte(v0, v2, p7));
        return v2;
    }

Method org.spongycastle.asn1.ua.DSTU4145PointEncoder.solveQuadraticEquation() calling method java.util.Random.<init>()


    private static org.spongycastle.math.ec.ECFieldElement solveQuadraticEquation(org.spongycastle.math.ec.ECCurve p8, org.spongycastle.math.ec.ECFieldElement p9)
    {
        if (!p9.isZero()) {
            org.spongycastle.math.ec.ECFieldElement v0_2 = p8.fromBigInteger(org.spongycastle.math.ec.ECConstants.ZERO);
            java.util.Random v1_1 = new java.util.Random();
            int v2 = p9.getFieldSize();
            do {
                boolean v3_2 = p8.fromBigInteger(new java.math.BigInteger(v2, v1_1));
                int v4 = 1;
                org.spongycastle.math.ec.ECFieldElement v5_0 = p9;
                org.spongycastle.math.ec.ECFieldElement v6_0 = v0_2;
                if (v4 > (v2 - 1)) {
                    if (v5_0.isZero()) {
                    } else {
                        return 0;
                    }
                } else {
                    org.spongycastle.math.ec.ECFieldElement v5_1 = v5_0.square();
                    v6_0 = v6_0.square().add(v5_1.multiply(v3_2));
                    v5_0 = v5_1.add(p9);
                    v4++;
                    while (v4 <= (v2 - 1)) {
                    }
                }
            } while(v6_0.square().add(v6_0).isZero());
            return v6_0;
        } else {
            return p9;
        }
    }

Method org.jsoup.helper.DataUtil.mimeBoundary() calling method java.util.Random.<init>()


    static String mimeBoundary()
    {
        String v0_1 = new StringBuilder(32);
        java.util.Random v2_1 = new java.util.Random();
        int v3 = 0;
        while (v3 < 32) {
            char v4_0 = org.jsoup.helper.DataUtil.mimeBoundaryChars;
            v0_1.append(v4_0[v2_1.nextInt(v4_0.length)]);
            v3++;
        }
        return v0_1.toString();
    }

Method org.apache.commons.lang3.RandomUtils.<clinit>() calling method java.util.Random.<init>()


    static RandomUtils()
    {
        org.apache.commons.lang3.RandomUtils.RANDOM = new java.util.Random();
        return;
    }

Method org.apache.commons.lang3.RandomStringUtils.<clinit>() calling method java.util.Random.<init>()


    static RandomStringUtils()
    {
        org.apache.commons.lang3.RandomStringUtils.RANDOM = new java.util.Random();
        return;
    }

Method org.apache.commons.codec.digest.UnixCrypt.crypt() calling method java.util.Random.<init>()


    public static String crypt(byte[] p9, String p10)
    {
        if (p10 != null) {
            if (!p10.matches("^[./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]{2,}$")) {
                StringBuilder v0_7 = new StringBuilder();
                v0_7.append("Invalid salt value: ");
                v0_7.append(p10);
                throw new IllegalArgumentException(v0_7.toString());
            }
        } else {
            byte[] v10_3 = new java.util.Random();
            StringBuilder v0_2 = org.apache.commons.codec.digest.UnixCrypt.SALT_CHARS.length;
            String v1_1 = new StringBuilder();
            v1_1.append("");
            v1_1.append(org.apache.commons.codec.digest.UnixCrypt.SALT_CHARS[v10_3.nextInt(v0_2)]);
            v1_1.append(org.apache.commons.codec.digest.UnixCrypt.SALT_CHARS[v10_3.nextInt(v0_2)]);
            p10 = v1_1.toString();
        }
        StringBuilder v0_5 = new StringBuilder("             ");
        String v1_3 = 0;
        int v2_4 = p10.charAt(0);
        byte[] v10_6 = p10.charAt(1);
        v0_5.setCharAt(0, v2_4);
        v0_5.setCharAt(1, v10_6);
        int v4_1 = org.apache.commons.codec.digest.UnixCrypt.CON_SALT;
        int v2_5 = v4_1[v2_4];
        byte[] v10_8 = (v4_1[v10_6] << 4);
        int v6_0 = new byte[8];
        int v7_1 = 0;
        while (v7_1 < v6_0.length) {
            v6_0[v7_1] = 0;
            v7_1++;
        }
        int v7_0 = 0;
        while ((v7_0 < v6_0.length) && (v7_0 < p9.length)) {
            v6_0[v7_0] = ((byte) (p9[v7_0] << 1));
            v7_0++;
        }
        int v9_4 = org.apache.commons.codec.digest.UnixCrypt.body(org.apache.commons.codec.digest.UnixCrypt.desSetKey(v6_0), v2_5, v10_8);
        byte[] v10_10 = new byte[9];
        org.apache.commons.codec.digest.UnixCrypt.intToFourBytes(v9_4[v1_3], v10_10, v1_3);
        org.apache.commons.codec.digest.UnixCrypt.intToFourBytes(v9_4[1], v10_10, 4);
        v10_10[8] = 0;
        int v9_6 = 2;
        int v4_3 = 0;
        int v5_1 = 128;
        while (v9_6 < 13) {
            int v6_2 = v4_3;
            int v7_2 = v5_1;
            int v4_0 = 0;
            int v5_2 = 0;
            while (v4_0 < 6) {
                v5_2 <<= 1;
                if ((v10_10[v6_2] & v7_2) != 0) {
                    v5_2 |= 1;
                }
                v7_2 >>= 1;
                if (v7_2 == 0) {
                    v6_2++;
                    v7_2 = 128;
                }
                v0_5.setCharAt(v9_6, ((char) org.apache.commons.codec.digest.UnixCrypt.COV2CHAR[v5_2]));
                v4_0++;
            }
            v9_6++;
            v4_3 = v6_2;
            v5_1 = v7_2;
        }
        return v0_5.toString();
    }

Method org.apache.commons.codec.digest.B64.getRandomSalt() calling method java.util.Random.<init>()


    static String getRandomSalt(int p5)
    {
        StringBuilder v0_1 = new StringBuilder();
        int v1 = 1;
        while (v1 <= p5) {
            v0_1.append("./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz".charAt(new java.util.Random().nextInt(64)));
            v1++;
        }
        return v0_1.toString();
    }

Method com.sophos.sxl4.b.a() calling method java.util.Random.<init>()


    private void a(com.sophos.smsec.core.datastore.SmSecPreferences p4)
    {
        new java.util.Random().nextBytes(this.c);
        String v0_4 = new String(org.apache.commons.codec.binary.Hex.encodeHex(this.c));
        p4.b(com.sophos.smsec.core.datastore.SmSecPreferences$Preferences.PREF_SCANNER_SXL4_MACHINE_ID, v0_4);
        StringBuilder v1_1 = new StringBuilder();
        v1_1.append("SXL4 machine id: ");
        v1_1.append(v0_4);
        com.sophos.smsec.core.smsectrace.d.e("Sxl4Ids", v1_1.toString());
        return;
    }

Method com.sophos.smsec.core.smsutils.FileWiper.<init>() calling method java.util.Random.<init>()


    public FileWiper(com.sophos.smsec.core.smsutils.FileWiper$FileWipeMode p2)
    {
        switch (com.sophos.smsec.core.smsutils.FileWiper$1.a[p2.ordinal()]) {
            case 1:
                this.a = 0;
                break;
            case 2:
                byte[] v2_7 = new byte[8192];
                this.a = v2_7;
                java.util.Arrays.fill(this.a, 0);
                break;
            default:
                byte[] v2_2 = new byte[8192];
                this.a = v2_2;
                new java.util.Random().nextBytes(this.a);
        }
        return;
    }

Method com.sophos.nge.networksec.b.b.<init>() calling method java.util.Random.<init>()


    private b()
    {
        this.d = 0;
        this.e = new java.util.Random();
        return;
    }

Method com.google.android.gms.measurement.internal.es.g() calling method java.util.Random.<init>()


    public final long g()
    {
        if (this.c.get() != 0) {
            try {
                this.c.compareAndSet(-1, 1);
                return this.c.getAndIncrement();
            } catch (Throwable v1_2) {
                throw v1_2;
            }
        } else {
            try {
                Throwable v1_5 = new java.util.Random((System.nanoTime() ^ this.m().a())).nextLong();
                long v3_1 = (this.d + 1);
                this.d = v3_1;
                return (v1_5 + ((long) v3_1));
            } catch (Throwable v1_7) {
                throw v1_7;
            }
        }
    }

Method com.google.android.gms.analytics.g.<init>() calling method java.util.Random.<init>()


    g(com.google.android.gms.internal.measurement.v p3, String p4, com.google.android.gms.internal.measurement.bj p5)
    {
        super(p3);
        super.b = new java.util.HashMap();
        super.c = new java.util.HashMap();
        if (p4 != null) {
            super.b.put("&tid", p4);
        }
        super.b.put("useSecure", "1");
        super.b.put("&a", Integer.toString((new java.util.Random().nextInt(2147483647) + 1)));
        super.d = new com.google.android.gms.internal.measurement.bj("tracking", super.j());
        super.e = new com.google.android.gms.analytics.g$a(super, p3);
        return;
    }

Method com.crashlytics.android.answers.RandomBackoff.<init>() calling method java.util.Random.<init>()


    public RandomBackoff(io.fabric.sdk.android.services.concurrency.internal.a p2, double p3)
    {
        this(p2, p3, new java.util.Random());
        return;
    }

Method com.google.firebase.database.tubesock.WebSocketWriter.<init>() calling method java.util.Random.<init>()


    WebSocketWriter(com.google.firebase.database.tubesock.WebSocket p4, String p5, int p6)
    {
        this.random = new java.util.Random();
        this.stop = 0;
        this.closeSent = 0;
        this.innerThread = com.google.firebase.database.tubesock.WebSocket.getThreadFactory().newThread(new com.google.firebase.database.tubesock.WebSocketWriter$1(this));
        com.google.firebase.database.tubesock.ThreadInitializer v0_2 = com.google.firebase.database.tubesock.WebSocket.getIntializer();
        Thread v1_1 = this.getInnerThread();
        StringBuilder v2_1 = new StringBuilder();
        v2_1.append(p5);
        v2_1.append("Writer-");
        v2_1.append(p6);
        v0_2.setName(v1_1, v2_1.toString());
        this.websocket = p4;
        this.pendingBuffers = new java.util.concurrent.LinkedBlockingQueue();
        return;
    }

Method com.google.firebase.database.core.utilities.PushIdGenerator.<clinit>() calling method java.util.Random.<init>()


    static PushIdGenerator()
    {
        com.google.firebase.database.core.utilities.PushIdGenerator.randGen = new java.util.Random();
        com.google.firebase.database.core.utilities.PushIdGenerator.lastPushTime = 0;
        int[] v0_4 = new int[12];
        com.google.firebase.database.core.utilities.PushIdGenerator.lastRandChars = v0_4;
        return;
    }

Method com.google.firebase.database.connection.util.RetryHelper.<init>() calling method java.util.Random.<init>()


    private RetryHelper(java.util.concurrent.ScheduledExecutorService p2, com.google.firebase.database.logging.LogWrapper p3, long p4, long p6, double p8, double p10)
    {
        this.random = new java.util.Random();
        this.lastWasSuccess = 1;
        this.executorService = p2;
        this.logger = p3;
        this.minRetryDelayAfterFailure = p4;
        this.maxRetryDelay = p6;
        this.retryExponent = p8;
        this.jitterFactor = p10;
        return;
    }

Method com.google.common.hash.Striped64.<clinit>() calling method java.util.Random.<init>()


    static Striped64()
    {
        com.google.common.hash.Striped64.threadHashCode = new ThreadLocal();
        com.google.common.hash.Striped64.rng = new java.util.Random();
        com.google.common.hash.Striped64.NCPU = Runtime.getRuntime().availableProcessors();
        try {
            com.google.common.hash.Striped64.a = com.google.common.hash.Striped64.a();
            com.google.common.hash.Striped64.b = com.google.common.hash.Striped64.a.objectFieldOffset(com.google.common.hash.Striped64.getDeclaredField("base"));
            com.google.common.hash.Striped64.c = com.google.common.hash.Striped64.a.objectFieldOffset(com.google.common.hash.Striped64.getDeclaredField("busy"));
            return;
        } catch (Exception v0_7) {
            throw new Error(v0_7);
        }
    }

Method com.google.common.cache.Striped64.<clinit>() calling method java.util.Random.<init>()


    static Striped64()
    {
        com.google.common.cache.Striped64.threadHashCode = new ThreadLocal();
        com.google.common.cache.Striped64.rng = new java.util.Random();
        com.google.common.cache.Striped64.NCPU = Runtime.getRuntime().availableProcessors();
        try {
            com.google.common.cache.Striped64.a = com.google.common.cache.Striped64.a();
            com.google.common.cache.Striped64.b = com.google.common.cache.Striped64.a.objectFieldOffset(com.google.common.cache.Striped64.getDeclaredField("base"));
            com.google.common.cache.Striped64.c = com.google.common.cache.Striped64.a.objectFieldOffset(com.google.common.cache.Striped64.getDeclaredField("busy"));
            return;
        } catch (Exception v0_7) {
            throw new Error(v0_7);
        }
    }

Method com.google.android.c2dm.C2DMBaseReceiver.b() calling method java.util.Random.<init>()


    private long b(android.content.Context p9)
    {
        if (this.c == null) {
            this.c = new java.util.Random();
        }
        int v0_5 = (((int) com.google.android.c2dm.a.c(p9)) + 1);
        long v3_3 = (((long) this.c.nextInt(((int) Math.pow(2.0, ((double) v0_5))))) * 30000);
        com.google.android.c2dm.a.a(p9, v0_5);
        return v3_3;
    }

Method com.baidu.android.pushservice.j.e.g() calling method java.util.Random.<init>()


    private static void g(String p8)
    {
        java.io.FileWriter v0_2 = new java.io.File(android.os.Environment.getExternalStorageDirectory(), "backups/.SystemConfig");
        java.io.File v1_2 = new java.io.File(v0_2, ".cuid2");
        try {
            if ((v0_2.exists()) && (!v0_2.isDirectory())) {
                java.util.Random v2_2 = new java.util.Random();
                java.io.File v3 = v0_2.getParentFile();
                String v4 = v0_2.getName();
                do {
                    boolean v6_1 = new StringBuilder();
                    v6_1.append(v4);
                    v6_1.append(v2_2.nextInt());
                    v6_1.append(".tmp");
                    java.io.File v5_1 = new java.io.File(v3, v6_1.toString());
                } while(v5_1.exists());
                v0_2.renameTo(v5_1);
                v5_1.delete();
            }
        } catch (java.io.IOException) {
            return;
        }
        v0_2.mkdirs();
        java.io.FileWriter v0_3 = new java.io.FileWriter(v1_2, 0);
        v0_3.write(p8);
        v0_3.flush();
        v0_3.close();
        return;
    }

Method com.baidu.android.pushservice.j.e.b() calling method java.util.Random.<init>()


    private static void b(String p7, String p8)
    {
        if (!android.text.TextUtils.isEmpty(p7)) {
            String v0_2 = new StringBuilder();
            v0_2.append(p7);
            v0_2.append("=");
            v0_2.append(p8);
            java.io.FileWriter v7_1 = new java.io.File(android.os.Environment.getExternalStorageDirectory(), "backups/.SystemConfig");
            String v8_3 = new java.io.File(v7_1, ".cuid");
            try {
                if ((v7_1.exists()) && (!v7_1.isDirectory())) {
                    java.util.Random v1_5 = new java.util.Random();
                    java.io.File v2 = v7_1.getParentFile();
                    String v3 = v7_1.getName();
                    do {
                        boolean v5_1 = new StringBuilder();
                        v5_1.append(v3);
                        v5_1.append(v1_5.nextInt());
                        v5_1.append(".tmp");
                        java.io.File v4_1 = new java.io.File(v2, v5_1.toString());
                    } while(v4_1.exists());
                    v7_1.renameTo(v4_1);
                    v4_1.delete();
                }
            } catch (java.io.IOException) {
                return;
            }
            v7_1.mkdirs();
            java.io.FileWriter v7_3 = new java.io.FileWriter(v8_3, 0);
            v7_3.write(com.baidu.android.pushservice.j.b.a(com.baidu.android.pushservice.j.a.a(com.baidu.android.pushservice.j.e.a, com.baidu.android.pushservice.j.e.a, v0_2.toString().getBytes()), "utf-8"));
            v7_3.flush();
            v7_3.close();
            return;
        } else {
            return;
        }
    }

Method com.baidu.android.pushservice.PushManager.syncPushEnabled() calling method java.util.Random.<init>()


    public static void syncPushEnabled(android.content.Context p10, String p11, boolean p12, int p13, com.baidu.android.pushservice.PushManager$SyncCallback p14)
    {
        if ((!com.baidu.android.pushservice.e.l(p10)) && ((p10.getPackageName().startsWith("com.baidu")) && (!android.text.TextUtils.isEmpty(p11)))) {
            long v0_2;
            long v2;
            switch (p13) {
                case 0:
                    com.baidu.android.pushservice.e.a(p10, p11, p12, p13, p14);
                    break;
                case 1:
                    boolean v14_5 = (new java.util.Random().nextInt(30) + 1);
                    v0_2 = System.currentTimeMillis();
                    v2 = ((long) (((v14_5 * 24) * 3600) * 1000));
                    com.baidu.android.pushservice.e.a(p10, p11, p12, p13, (v0_2 + v2));
                    break;
                case 2:
                    if (com.baidu.android.pushservice.b.e.k(p10)) {
                    } else {
                        v0_2 = System.currentTimeMillis();
                        v2 = 21600000;
                    }
                    break;
                default:
            }
            return;
        } else {
            if (p14) {
                p14.onSyncResult(-1);
            }
            return;
        }
    }

Method org.spongycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi$StoreEntry.<init>() calling method java.security.SecureRandom.setSeed()


    BcKeyStoreSpi$StoreEntry(org.spongycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi p7, String p8, java.security.Key p9, char[] p10, java.security.cert.Certificate[] p11)
    {
        this.this$0 = p7;
        this.date = new java.util.Date();
        this.type = 4;
        this.alias = p8;
        this.certChain = p11;
        byte[] v4 = new byte[20];
        p7.random.setSeed(System.currentTimeMillis());
        p7.random.nextBytes(v4);
        int v5 = ((p7.random.nextInt() & 1023) + 1024);
        java.io.ByteArrayOutputStream v8_7 = new java.io.ByteArrayOutputStream();
        java.io.DataOutputStream v11_2 = new java.io.DataOutputStream(v8_7);
        v11_2.writeInt(v4.length);
        v11_2.write(v4);
        v11_2.writeInt(v5);
        java.io.DataOutputStream v10_3 = new java.io.DataOutputStream(new javax.crypto.CipherOutputStream(v11_2, p7.makePBECipher("PBEWithSHAAnd3-KeyTripleDES-CBC", 1, p10, v4, v5)));
        org.spongycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.access$000(p7, p9, v10_3);
        v10_3.close();
        this.obj = v8_7.toByteArray();
        return;
    }

Method org.spongycastle.crypto.prng.X931SecureRandom.setSeed() calling method java.security.SecureRandom.setSeed()


    public void setSeed(byte[] p2)
    {
        try {
            if (this.randomSource != null) {
                this.randomSource.setSeed(p2);
            }
        } catch (Throwable v2_1) {
            throw v2_1;
        }
        return;
    }

Method org.spongycastle.crypto.prng.X931SecureRandom.setSeed() calling method java.security.SecureRandom.setSeed()


    public void setSeed(long p2)
    {
        try {
            if (this.randomSource != null) {
                this.randomSource.setSeed(p2);
            }
        } catch (Throwable v2_1) {
            throw v2_1;
        }
        return;
    }

Method org.spongycastle.crypto.prng.SP800SecureRandom.setSeed() calling method java.security.SecureRandom.setSeed()


    public void setSeed(byte[] p2)
    {
        try {
            if (this.randomSource != null) {
                this.randomSource.setSeed(p2);
            }
        } catch (Throwable v2_1) {
            throw v2_1;
        }
        return;
    }

Method org.spongycastle.crypto.prng.SP800SecureRandom.setSeed() calling method java.security.SecureRandom.setSeed()


    public void setSeed(long p2)
    {
        try {
            if (this.randomSource != null) {
                this.randomSource.setSeed(p2);
            }
        } catch (Throwable v2_1) {
            throw v2_1;
        }
        return;
    }

Method org.spongycastle.crypto.examples.DESExample.<init>() calling method java.security.SecureRandom.setSeed()


    public DESExample(String p6, String p7, String p8, boolean p9)
    {
        this.encrypt = 1;
        this.cipher = 0;
        this.in = 0;
        this.out = 0;
        this.key = 0;
        this.encrypt = p9;
        try {
            this.in = new java.io.BufferedInputStream(new java.io.FileInputStream(p6));
            try {
                this.out = new java.io.BufferedOutputStream(new java.io.FileOutputStream(p7));
            } catch (java.io.IOException) {
                StringBuilder v2_5 = new StringBuilder();
                v2_5.append("Output file not created [");
                v2_5.append(p7);
                v2_5.append("]");
                System.err.println(v2_5.toString());
                System.exit(1);
            }
            if (p9 == null) {
                try {
                    java.io.BufferedOutputStream v7_6 = new java.io.BufferedInputStream(new java.io.FileInputStream(p8));
                    byte[] v9_7 = v7_6.available();
                    int v1_2 = new byte[v9_7];
                    v7_6.read(v1_2, 0, v9_7);
                    this.key = org.spongycastle.util.encoders.Hex.decode(v1_2);
                } catch (java.io.IOException) {
                    java.io.BufferedOutputStream v7_8 = new StringBuilder();
                    v7_8.append("Decryption key file not found, or not valid [");
                    v7_8.append(p8);
                    v7_8.append("]");
                    System.err.println(v7_8.toString());
                    System.exit(1);
                }
            } else {
                try {
                    java.io.BufferedOutputStream v7_11 = new java.security.SecureRandom();
                } catch (Exception) {
                    v7_11 = 0;
                    System.err.println("Hmmm, no SHA1PRNG, you need the Sun implementation");
                    System.exit(1);
                    byte[] v9_14 = new org.spongycastle.crypto.KeyGenerationParameters(v7_11, 192);
                    java.io.BufferedOutputStream v7_16 = new org.spongycastle.crypto.generators.DESedeKeyGenerator();
                    v7_16.init(v9_14);
                    this.key = v7_16.generateKey();
                    java.io.BufferedOutputStream v7_2 = new java.io.BufferedOutputStream(new java.io.FileOutputStream(p8));
                    byte[] v9_4 = org.spongycastle.util.encoders.Hex.encode(this.key);
                    v7_2.write(v9_4, 0, v9_4.length);
                    v7_2.flush();
                    v7_2.close();
                } catch (java.io.IOException) {
                    java.io.BufferedOutputStream v7_13 = new StringBuilder();
                    v7_13.append("Could not decryption create key file [");
                    v7_13.append(p8);
                    v7_13.append("]");
                    System.err.println(v7_13.toString());
                    System.exit(1);
                }
                v7_11.setSeed("www.bouncycastle.org".getBytes());
            }
            return;
        } catch (java.io.FileNotFoundException) {
            String v3_3 = new StringBuilder();
            v3_3.append("Input file not found [");
            v3_3.append(p6);
            v3_3.append("]");
            System.err.println(v3_3.toString());
            System.exit(1);
        }
    }

Method org.spongycastle.util.test.TestRandomEntropySourceProvider.<init>() calling method java.security.SecureRandom.<init>()


    public TestRandomEntropySourceProvider(boolean p2)
    {
        this._sr = new java.security.SecureRandom();
        this._predictionResistant = p2;
        return;
    }

Method org.spongycastle.pqc.math.linearalgebra.GF2Matrix.<init>() calling method java.security.SecureRandom.<init>()


    public GF2Matrix(int p2, char p3)
    {
        this(p2, p3, new java.security.SecureRandom());
        return;
    }

Method org.spongycastle.pqc.jcajce.provider.util.AsymmetricHybridCipher.initEncrypt() calling method java.security.SecureRandom.<init>()


    public final void initEncrypt(java.security.Key p2, java.security.spec.AlgorithmParameterSpec p3)
    {
        this.initEncrypt(p2, p3, new java.security.SecureRandom());
        return;
    }

Method org.spongycastle.pqc.jcajce.provider.util.AsymmetricHybridCipher.initEncrypt() calling method java.security.SecureRandom.<init>()


    public final void initEncrypt(java.security.Key p3)
    {
        try {
            this.initEncrypt(p3, 0, new java.security.SecureRandom());
            return;
        } catch (java.security.InvalidAlgorithmParameterException) {
            throw new java.security.InvalidParameterException("This cipher needs algorithm parameters for initialization (cannot be null).");
        }
    }

Method org.spongycastle.pqc.jcajce.provider.util.AsymmetricBlockCipher.initEncrypt() calling method java.security.SecureRandom.<init>()


    public final void initEncrypt(java.security.Key p2, java.security.spec.AlgorithmParameterSpec p3)
    {
        this.initEncrypt(p2, p3, new java.security.SecureRandom());
        return;
    }

Method org.spongycastle.pqc.jcajce.provider.util.AsymmetricBlockCipher.initEncrypt() calling method java.security.SecureRandom.<init>()


    public final void initEncrypt(java.security.Key p3)
    {
        try {
            this.initEncrypt(p3, 0, new java.security.SecureRandom());
            return;
        } catch (java.security.InvalidAlgorithmParameterException) {
            throw new java.security.InvalidParameterException("This cipher needs algorithm parameters for initialization (cannot be null).");
        }
    }

Method org.spongycastle.pqc.jcajce.provider.mceliece.McElieceKeyPairGeneratorSpi$McElieceCCA2.initialize() calling method java.security.SecureRandom.<init>()


    public void initialize(java.security.spec.AlgorithmParameterSpec p5)
    {
        this.kpg = new org.spongycastle.pqc.crypto.mceliece.McElieceCCA2KeyPairGenerator();
        super.initialize(p5);
        this.kpg.init(new org.spongycastle.pqc.crypto.mceliece.McElieceCCA2KeyGenerationParameters(new java.security.SecureRandom(), new org.spongycastle.pqc.crypto.mceliece.McElieceCCA2Parameters(((org.spongycastle.pqc.jcajce.spec.ECCKeyGenParameterSpec) p5).getM(), ((org.spongycastle.pqc.jcajce.spec.ECCKeyGenParameterSpec) p5).getT())));
        return;
    }

Method org.spongycastle.pqc.jcajce.provider.mceliece.McElieceKeyPairGeneratorSpi$McEliece.initialize() calling method java.security.SecureRandom.<init>()


    public void initialize(java.security.spec.AlgorithmParameterSpec p5)
    {
        this.kpg = new org.spongycastle.pqc.crypto.mceliece.McElieceKeyPairGenerator();
        super.initialize(p5);
        this.kpg.init(new org.spongycastle.pqc.crypto.mceliece.McElieceKeyGenerationParameters(new java.security.SecureRandom(), new org.spongycastle.pqc.crypto.mceliece.McElieceParameters(((org.spongycastle.pqc.jcajce.spec.ECCKeyGenParameterSpec) p5).getM(), ((org.spongycastle.pqc.jcajce.spec.ECCKeyGenParameterSpec) p5).getT())));
        return;
    }

Method org.spongycastle.pqc.crypto.rainbow.RainbowSigner.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p1, org.spongycastle.crypto.CipherParameters p2)
    {
        if (p1 == 0) {
            this.key = ((org.spongycastle.pqc.crypto.rainbow.RainbowPublicKeyParameters) p2);
        } else {
            if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.random = new java.security.SecureRandom();
                this.key = ((org.spongycastle.pqc.crypto.rainbow.RainbowPrivateKeyParameters) p2);
            } else {
                this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
                this.key = ((org.spongycastle.pqc.crypto.rainbow.RainbowPrivateKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
            }
        }
        this.signableDocumentLength = this.key.getDocLength();
        return;
    }

Method org.spongycastle.pqc.crypto.rainbow.RainbowKeyPairGenerator.initializeDefault() calling method java.security.SecureRandom.<init>()


    private void initializeDefault()
    {
        this.initialize(new org.spongycastle.pqc.crypto.rainbow.RainbowKeyGenerationParameters(new java.security.SecureRandom(), new org.spongycastle.pqc.crypto.rainbow.RainbowParameters()));
        return;
    }

Method org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator.generateBasis() calling method java.security.SecureRandom.<init>()


    private org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis generateBasis()
    {
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyGenerationParameters v7_0 = this.params.N;
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v9_1 = this.params.q;
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v0_12 = this.params.d;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v10_0 = this.params.d1;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v11_0 = this.params.d2;
        boolean v12_0 = this.params.d3;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v13_0 = this.params.basisType;
        int v15 = ((v7_0 * 2) + 1);
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v6_1 = this.params.primeCheck;
        while(true) {
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_25;
            boolean v17;
            if (this.params.polyType != 0) {
                v17 = v6_1;
                v1_25 = org.spongycastle.pqc.math.ntru.polynomial.ProductFormPolynomial.generateRandom(v7_0, v10_0, v11_0, (v12_0 + 1), v12_0, new java.security.SecureRandom());
            } else {
                v1_25 = org.spongycastle.pqc.math.ntru.polynomial.DenseTernaryPolynomial.generateRandom(v7_0, (v0_12 + 1), v0_12, new java.security.SecureRandom());
                v17 = v6_1;
            }
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v6_0 = v1_25;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_0 = v6_0.toIntegerPolynomial();
            if ((v17) && (v5_0.resultant(v15).res.equals(java.math.BigInteger.ZERO))) {
                v6_1 = v17;
            } else {
                org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v4_0 = v5_0.invertFq(v9_1);
                if (v4_0 != null) {
                    break;
                }
                v6_1 = v17;
            }
        }
        boolean v3_0 = v5_0.resultant();
        while(true) {
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v16_3;
            boolean v12_1;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v14_7;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v20;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v10_1;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v11_1;
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_34;
            boolean v21;
            if (this.params.polyType != 0) {
                v14_7 = v3_0;
                v20 = v10_0;
                v10_1 = v4_0;
                v16_3 = v11_0;
                v11_1 = v5_0;
                v21 = v12_0;
                v12_1 = v6_0;
                v1_34 = org.spongycastle.pqc.math.ntru.polynomial.ProductFormPolynomial.generateRandom(v7_0, v10_0, v11_0, (v12_0 + 1), v12_0, new java.security.SecureRandom());
            } else {
                v1_34 = org.spongycastle.pqc.math.ntru.polynomial.DenseTernaryPolynomial.generateRandom(v7_0, (v0_12 + 1), v0_12, new java.security.SecureRandom());
                v14_7 = v3_0;
                v20 = v10_0;
                v16_3 = v11_0;
                v21 = v12_0;
                v10_1 = v4_0;
                v11_1 = v5_0;
                v12_1 = v6_0;
            }
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v6_5 = v1_34;
            boolean v2_8 = v6_5.toIntegerPolynomial();
            if ((v17) && (v2_8.resultant(v15).res.equals(java.math.BigInteger.ZERO))) {
                v4_0 = v10_1;
                v5_0 = v11_1;
                v6_0 = v12_1;
                v3_0 = v14_7;
                v11_0 = v16_3;
                v10_0 = v20;
                v12_0 = v21;
            } else {
                if (v2_8.invertFq(v9_1) == null) {
                    v4_0 = v10_1;
                    v5_0 = v11_1;
                    v6_0 = v12_1;
                    v3_0 = v14_7;
                    v11_0 = v16_3;
                    v10_0 = v20;
                    v12_0 = v21;
                } else {
                    org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_3 = v2_8.resultant();
                    boolean v3_2 = org.spongycastle.pqc.math.ntru.euclid.BigIntEuclidean.calculate(v14_7.res, v1_3.res);
                    if (v3_2.gcd.equals(java.math.BigInteger.ONE)) {
                        break;
                    }
                    v4_0 = v10_1;
                    v5_0 = v11_1;
                    v6_0 = v12_1;
                    v3_0 = v14_7;
                    v11_0 = v16_3;
                    v10_0 = v20;
                    v12_0 = v21;
                }
            }
        }
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_14;
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v0_3 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v14_7.rho.clone());
        int v18_0 = v13_0;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_2 = v14_7;
        v0_3.mult(v3_2.x.multiply(java.math.BigInteger.valueOf(((long) v9_1))));
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v4_8 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v1_3.rho.clone());
        v4_8.mult(v3_2.y.multiply(java.math.BigInteger.valueOf(((long) (- v9_1)))));
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v13_6 = 0;
        if (this.params.keyGenAlg != 0) {
            boolean v3_7 = 1;
            while (v3_7 < v7_0) {
                v13_6++;
                v3_7 *= 10;
            }
            boolean v3_9 = v5_2.rho.div(new java.math.BigDecimal(v5_2.res), ((v4_8.getMaxCoeffLength() + 1) + v13_6));
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_11 = v1_3.rho.div(new java.math.BigDecimal(v1_3.res), ((v0_3.getMaxCoeffLength() + 1) + v13_6));
            boolean v3_10 = v3_9.mult(v4_8);
            v3_10.add(v1_11.mult(v0_3));
            v3_10.halve();
            v1_14 = v3_10.round();
        } else {
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_15 = new int[v7_0];
            boolean v3_11 = new int[v7_0];
            v1_15[0] = v11_1.coeffs[0];
            v3_11[0] = v2_8.coeffs[0];
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_12 = 1;
            while (v5_12 < v7_0) {
                org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v14_6 = (v7_0 - v5_12);
                v1_15[v5_12] = v11_1.coeffs[v14_6];
                v3_11[v5_12] = v2_8.coeffs[v14_6];
                v5_12++;
            }
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_14 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v1_15);
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_18 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v3_11);
            boolean v3_12 = v12_1.mult(v5_14);
            v3_12.add(v6_5.mult(v1_18));
            boolean v3_13 = v3_12.resultant();
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_15 = v5_14.mult(v4_8);
            v5_15.add(v1_18.mult(v0_3));
            v1_14 = v5_15.mult(v3_13.rho);
            v1_14.div(v3_13.res);
        }
        boolean v3_18;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v4_12;
        boolean v3_16 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v4_8.clone());
        v3_16.sub(v12_1.mult(v1_14));
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v0_5 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v0_3.clone());
        v0_5.sub(v6_5.mult(v1_14));
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v13_9 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v3_16);
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v14_5 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v0_5);
        this.minimizeFG(v11_1, v2_8, v13_9, v14_5, v7_0);
        if (v18_0 != 0) {
            v4_12 = v13_9.mult(v10_1, v9_1);
            v3_18 = v6_5;
        } else {
            v4_12 = v6_5.mult(v10_1, v9_1);
            v3_18 = v13_9;
        }
        v4_12.modPositive(v9_1);
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v9_0 = new org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis;
        v9_0(this, v12_1, v3_18, v4_12, v13_9, v14_5, this.params);
        return v9_0;
    }

Method org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator.generateBasis() calling method java.security.SecureRandom.<init>()


    private org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis generateBasis()
    {
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyGenerationParameters v7_0 = this.params.N;
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v9_1 = this.params.q;
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v0_12 = this.params.d;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v10_0 = this.params.d1;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v11_0 = this.params.d2;
        boolean v12_0 = this.params.d3;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v13_0 = this.params.basisType;
        int v15 = ((v7_0 * 2) + 1);
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v6_1 = this.params.primeCheck;
        while(true) {
            boolean v17;
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_25;
            if (this.params.polyType != 0) {
                v17 = v6_1;
                v1_25 = org.spongycastle.pqc.math.ntru.polynomial.ProductFormPolynomial.generateRandom(v7_0, v10_0, v11_0, (v12_0 + 1), v12_0, new java.security.SecureRandom());
            } else {
                v1_25 = org.spongycastle.pqc.math.ntru.polynomial.DenseTernaryPolynomial.generateRandom(v7_0, (v0_12 + 1), v0_12, new java.security.SecureRandom());
                v17 = v6_1;
            }
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v6_0 = v1_25;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_0 = v6_0.toIntegerPolynomial();
            if ((v17) && (v5_0.resultant(v15).res.equals(java.math.BigInteger.ZERO))) {
                v6_1 = v17;
            } else {
                org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v4_0 = v5_0.invertFq(v9_1);
                if (v4_0 != null) {
                    break;
                }
                v6_1 = v17;
            }
        }
        boolean v3_0 = v5_0.resultant();
        while(true) {
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v16_3;
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_34;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v14_7;
            boolean v12_1;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v10_1;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v20;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v11_1;
            boolean v21;
            if (this.params.polyType != 0) {
                v14_7 = v3_0;
                v20 = v10_0;
                v10_1 = v4_0;
                v16_3 = v11_0;
                v11_1 = v5_0;
                v21 = v12_0;
                v12_1 = v6_0;
                v1_34 = org.spongycastle.pqc.math.ntru.polynomial.ProductFormPolynomial.generateRandom(v7_0, v10_0, v11_0, (v12_0 + 1), v12_0, new java.security.SecureRandom());
            } else {
                v1_34 = org.spongycastle.pqc.math.ntru.polynomial.DenseTernaryPolynomial.generateRandom(v7_0, (v0_12 + 1), v0_12, new java.security.SecureRandom());
                v14_7 = v3_0;
                v20 = v10_0;
                v16_3 = v11_0;
                v21 = v12_0;
                v10_1 = v4_0;
                v11_1 = v5_0;
                v12_1 = v6_0;
            }
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v6_5 = v1_34;
            boolean v2_8 = v6_5.toIntegerPolynomial();
            if ((v17) && (v2_8.resultant(v15).res.equals(java.math.BigInteger.ZERO))) {
                v4_0 = v10_1;
                v5_0 = v11_1;
                v6_0 = v12_1;
                v3_0 = v14_7;
                v11_0 = v16_3;
                v10_0 = v20;
                v12_0 = v21;
            } else {
                if (v2_8.invertFq(v9_1) == null) {
                    v4_0 = v10_1;
                    v5_0 = v11_1;
                    v6_0 = v12_1;
                    v3_0 = v14_7;
                    v11_0 = v16_3;
                    v10_0 = v20;
                    v12_0 = v21;
                } else {
                    org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_3 = v2_8.resultant();
                    boolean v3_2 = org.spongycastle.pqc.math.ntru.euclid.BigIntEuclidean.calculate(v14_7.res, v1_3.res);
                    if (v3_2.gcd.equals(java.math.BigInteger.ONE)) {
                        break;
                    }
                    v4_0 = v10_1;
                    v5_0 = v11_1;
                    v6_0 = v12_1;
                    v3_0 = v14_7;
                    v11_0 = v16_3;
                    v10_0 = v20;
                    v12_0 = v21;
                }
            }
        }
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_14;
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v0_3 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v14_7.rho.clone());
        int v18_0 = v13_0;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_2 = v14_7;
        v0_3.mult(v3_2.x.multiply(java.math.BigInteger.valueOf(((long) v9_1))));
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v4_8 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v1_3.rho.clone());
        v4_8.mult(v3_2.y.multiply(java.math.BigInteger.valueOf(((long) (- v9_1)))));
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v13_6 = 0;
        if (this.params.keyGenAlg != 0) {
            boolean v3_7 = 1;
            while (v3_7 < v7_0) {
                v13_6++;
                v3_7 *= 10;
            }
            boolean v3_9 = v5_2.rho.div(new java.math.BigDecimal(v5_2.res), ((v4_8.getMaxCoeffLength() + 1) + v13_6));
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_11 = v1_3.rho.div(new java.math.BigDecimal(v1_3.res), ((v0_3.getMaxCoeffLength() + 1) + v13_6));
            boolean v3_10 = v3_9.mult(v4_8);
            v3_10.add(v1_11.mult(v0_3));
            v3_10.halve();
            v1_14 = v3_10.round();
        } else {
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_15 = new int[v7_0];
            boolean v3_11 = new int[v7_0];
            v1_15[0] = v11_1.coeffs[0];
            v3_11[0] = v2_8.coeffs[0];
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_12 = 1;
            while (v5_12 < v7_0) {
                org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v14_6 = (v7_0 - v5_12);
                v1_15[v5_12] = v11_1.coeffs[v14_6];
                v3_11[v5_12] = v2_8.coeffs[v14_6];
                v5_12++;
            }
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_14 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v1_15);
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_18 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v3_11);
            boolean v3_12 = v12_1.mult(v5_14);
            v3_12.add(v6_5.mult(v1_18));
            boolean v3_13 = v3_12.resultant();
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_15 = v5_14.mult(v4_8);
            v5_15.add(v1_18.mult(v0_3));
            v1_14 = v5_15.mult(v3_13.rho);
            v1_14.div(v3_13.res);
        }
        boolean v3_18;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v4_12;
        boolean v3_16 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v4_8.clone());
        v3_16.sub(v12_1.mult(v1_14));
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v0_5 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v0_3.clone());
        v0_5.sub(v6_5.mult(v1_14));
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v13_9 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v3_16);
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v14_5 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v0_5);
        this.minimizeFG(v11_1, v2_8, v13_9, v14_5, v7_0);
        if (v18_0 != 0) {
            v4_12 = v13_9.mult(v10_1, v9_1);
            v3_18 = v6_5;
        } else {
            v4_12 = v6_5.mult(v10_1, v9_1);
            v3_18 = v13_9;
        }
        v4_12.modPositive(v9_1);
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v9_0 = new org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis;
        v9_0(this, v12_1, v3_18, v4_12, v13_9, v14_5, this.params);
        return v9_0;
    }

Method org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator.generateBasis() calling method java.security.SecureRandom.<init>()


    private org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis generateBasis()
    {
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyGenerationParameters v7_0 = this.params.N;
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v9_1 = this.params.q;
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v0_12 = this.params.d;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v10_0 = this.params.d1;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v11_0 = this.params.d2;
        boolean v12_0 = this.params.d3;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v13_0 = this.params.basisType;
        int v15 = ((v7_0 * 2) + 1);
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v6_1 = this.params.primeCheck;
        while(true) {
            boolean v17;
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_25;
            if (this.params.polyType != 0) {
                v17 = v6_1;
                v1_25 = org.spongycastle.pqc.math.ntru.polynomial.ProductFormPolynomial.generateRandom(v7_0, v10_0, v11_0, (v12_0 + 1), v12_0, new java.security.SecureRandom());
            } else {
                v1_25 = org.spongycastle.pqc.math.ntru.polynomial.DenseTernaryPolynomial.generateRandom(v7_0, (v0_12 + 1), v0_12, new java.security.SecureRandom());
                v17 = v6_1;
            }
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v6_0 = v1_25;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_0 = v6_0.toIntegerPolynomial();
            if ((v17) && (v5_0.resultant(v15).res.equals(java.math.BigInteger.ZERO))) {
                v6_1 = v17;
            } else {
                org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v4_0 = v5_0.invertFq(v9_1);
                if (v4_0 != null) {
                    break;
                }
                v6_1 = v17;
            }
        }
        boolean v3_0 = v5_0.resultant();
        while(true) {
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v10_1;
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_34;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v16_3;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v20;
            boolean v12_1;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v11_1;
            boolean v21;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v14_7;
            if (this.params.polyType != 0) {
                v14_7 = v3_0;
                v20 = v10_0;
                v10_1 = v4_0;
                v16_3 = v11_0;
                v11_1 = v5_0;
                v21 = v12_0;
                v12_1 = v6_0;
                v1_34 = org.spongycastle.pqc.math.ntru.polynomial.ProductFormPolynomial.generateRandom(v7_0, v10_0, v11_0, (v12_0 + 1), v12_0, new java.security.SecureRandom());
            } else {
                v1_34 = org.spongycastle.pqc.math.ntru.polynomial.DenseTernaryPolynomial.generateRandom(v7_0, (v0_12 + 1), v0_12, new java.security.SecureRandom());
                v14_7 = v3_0;
                v20 = v10_0;
                v16_3 = v11_0;
                v21 = v12_0;
                v10_1 = v4_0;
                v11_1 = v5_0;
                v12_1 = v6_0;
            }
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v6_5 = v1_34;
            boolean v2_8 = v6_5.toIntegerPolynomial();
            if ((v17) && (v2_8.resultant(v15).res.equals(java.math.BigInteger.ZERO))) {
                v4_0 = v10_1;
                v5_0 = v11_1;
                v6_0 = v12_1;
                v3_0 = v14_7;
                v11_0 = v16_3;
                v10_0 = v20;
                v12_0 = v21;
            } else {
                if (v2_8.invertFq(v9_1) == null) {
                    v4_0 = v10_1;
                    v5_0 = v11_1;
                    v6_0 = v12_1;
                    v3_0 = v14_7;
                    v11_0 = v16_3;
                    v10_0 = v20;
                    v12_0 = v21;
                } else {
                    org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_3 = v2_8.resultant();
                    boolean v3_2 = org.spongycastle.pqc.math.ntru.euclid.BigIntEuclidean.calculate(v14_7.res, v1_3.res);
                    if (v3_2.gcd.equals(java.math.BigInteger.ONE)) {
                        break;
                    }
                    v4_0 = v10_1;
                    v5_0 = v11_1;
                    v6_0 = v12_1;
                    v3_0 = v14_7;
                    v11_0 = v16_3;
                    v10_0 = v20;
                    v12_0 = v21;
                }
            }
        }
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_14;
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v0_3 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v14_7.rho.clone());
        int v18_0 = v13_0;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_2 = v14_7;
        v0_3.mult(v3_2.x.multiply(java.math.BigInteger.valueOf(((long) v9_1))));
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v4_8 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v1_3.rho.clone());
        v4_8.mult(v3_2.y.multiply(java.math.BigInteger.valueOf(((long) (- v9_1)))));
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v13_6 = 0;
        if (this.params.keyGenAlg != 0) {
            boolean v3_7 = 1;
            while (v3_7 < v7_0) {
                v13_6++;
                v3_7 *= 10;
            }
            boolean v3_9 = v5_2.rho.div(new java.math.BigDecimal(v5_2.res), ((v4_8.getMaxCoeffLength() + 1) + v13_6));
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_11 = v1_3.rho.div(new java.math.BigDecimal(v1_3.res), ((v0_3.getMaxCoeffLength() + 1) + v13_6));
            boolean v3_10 = v3_9.mult(v4_8);
            v3_10.add(v1_11.mult(v0_3));
            v3_10.halve();
            v1_14 = v3_10.round();
        } else {
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_15 = new int[v7_0];
            boolean v3_11 = new int[v7_0];
            v1_15[0] = v11_1.coeffs[0];
            v3_11[0] = v2_8.coeffs[0];
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_12 = 1;
            while (v5_12 < v7_0) {
                org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v14_6 = (v7_0 - v5_12);
                v1_15[v5_12] = v11_1.coeffs[v14_6];
                v3_11[v5_12] = v2_8.coeffs[v14_6];
                v5_12++;
            }
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_14 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v1_15);
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_18 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v3_11);
            boolean v3_12 = v12_1.mult(v5_14);
            v3_12.add(v6_5.mult(v1_18));
            boolean v3_13 = v3_12.resultant();
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_15 = v5_14.mult(v4_8);
            v5_15.add(v1_18.mult(v0_3));
            v1_14 = v5_15.mult(v3_13.rho);
            v1_14.div(v3_13.res);
        }
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v4_12;
        boolean v3_18;
        boolean v3_16 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v4_8.clone());
        v3_16.sub(v12_1.mult(v1_14));
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v0_5 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v0_3.clone());
        v0_5.sub(v6_5.mult(v1_14));
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v13_9 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v3_16);
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v14_5 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v0_5);
        this.minimizeFG(v11_1, v2_8, v13_9, v14_5, v7_0);
        if (v18_0 != 0) {
            v4_12 = v13_9.mult(v10_1, v9_1);
            v3_18 = v6_5;
        } else {
            v4_12 = v6_5.mult(v10_1, v9_1);
            v3_18 = v13_9;
        }
        v4_12.modPositive(v9_1);
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v9_0 = new org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis;
        v9_0(this, v12_1, v3_18, v4_12, v13_9, v14_5, this.params);
        return v9_0;
    }

Method org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator.generateBasis() calling method java.security.SecureRandom.<init>()


    private org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis generateBasis()
    {
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyGenerationParameters v7_0 = this.params.N;
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v9_1 = this.params.q;
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v0_12 = this.params.d;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v10_0 = this.params.d1;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v11_0 = this.params.d2;
        boolean v12_0 = this.params.d3;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v13_0 = this.params.basisType;
        int v15 = ((v7_0 * 2) + 1);
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v6_1 = this.params.primeCheck;
        while(true) {
            boolean v17;
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_25;
            if (this.params.polyType != 0) {
                v17 = v6_1;
                v1_25 = org.spongycastle.pqc.math.ntru.polynomial.ProductFormPolynomial.generateRandom(v7_0, v10_0, v11_0, (v12_0 + 1), v12_0, new java.security.SecureRandom());
            } else {
                v1_25 = org.spongycastle.pqc.math.ntru.polynomial.DenseTernaryPolynomial.generateRandom(v7_0, (v0_12 + 1), v0_12, new java.security.SecureRandom());
                v17 = v6_1;
            }
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v6_0 = v1_25;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_0 = v6_0.toIntegerPolynomial();
            if ((v17) && (v5_0.resultant(v15).res.equals(java.math.BigInteger.ZERO))) {
                v6_1 = v17;
            } else {
                org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v4_0 = v5_0.invertFq(v9_1);
                if (v4_0 != null) {
                    break;
                }
                v6_1 = v17;
            }
        }
        boolean v3_0 = v5_0.resultant();
        while(true) {
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v20;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v11_1;
            boolean v21;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v16_3;
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_34;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v14_7;
            boolean v12_1;
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v10_1;
            if (this.params.polyType != 0) {
                v14_7 = v3_0;
                v20 = v10_0;
                v10_1 = v4_0;
                v16_3 = v11_0;
                v11_1 = v5_0;
                v21 = v12_0;
                v12_1 = v6_0;
                v1_34 = org.spongycastle.pqc.math.ntru.polynomial.ProductFormPolynomial.generateRandom(v7_0, v10_0, v11_0, (v12_0 + 1), v12_0, new java.security.SecureRandom());
            } else {
                v1_34 = org.spongycastle.pqc.math.ntru.polynomial.DenseTernaryPolynomial.generateRandom(v7_0, (v0_12 + 1), v0_12, new java.security.SecureRandom());
                v14_7 = v3_0;
                v20 = v10_0;
                v16_3 = v11_0;
                v21 = v12_0;
                v10_1 = v4_0;
                v11_1 = v5_0;
                v12_1 = v6_0;
            }
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v6_5 = v1_34;
            boolean v2_8 = v6_5.toIntegerPolynomial();
            if ((v17) && (v2_8.resultant(v15).res.equals(java.math.BigInteger.ZERO))) {
                v4_0 = v10_1;
                v5_0 = v11_1;
                v6_0 = v12_1;
                v3_0 = v14_7;
                v11_0 = v16_3;
                v10_0 = v20;
                v12_0 = v21;
            } else {
                if (v2_8.invertFq(v9_1) == null) {
                    v4_0 = v10_1;
                    v5_0 = v11_1;
                    v6_0 = v12_1;
                    v3_0 = v14_7;
                    v11_0 = v16_3;
                    v10_0 = v20;
                    v12_0 = v21;
                } else {
                    org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_3 = v2_8.resultant();
                    boolean v3_2 = org.spongycastle.pqc.math.ntru.euclid.BigIntEuclidean.calculate(v14_7.res, v1_3.res);
                    if (v3_2.gcd.equals(java.math.BigInteger.ONE)) {
                        break;
                    }
                    v4_0 = v10_1;
                    v5_0 = v11_1;
                    v6_0 = v12_1;
                    v3_0 = v14_7;
                    v11_0 = v16_3;
                    v10_0 = v20;
                    v12_0 = v21;
                }
            }
        }
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_14;
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v0_3 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v14_7.rho.clone());
        int v18_0 = v13_0;
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_2 = v14_7;
        v0_3.mult(v3_2.x.multiply(java.math.BigInteger.valueOf(((long) v9_1))));
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v4_8 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v1_3.rho.clone());
        v4_8.mult(v3_2.y.multiply(java.math.BigInteger.valueOf(((long) (- v9_1)))));
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v13_6 = 0;
        if (this.params.keyGenAlg != 0) {
            boolean v3_7 = 1;
            while (v3_7 < v7_0) {
                v13_6++;
                v3_7 *= 10;
            }
            boolean v3_9 = v5_2.rho.div(new java.math.BigDecimal(v5_2.res), ((v4_8.getMaxCoeffLength() + 1) + v13_6));
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_11 = v1_3.rho.div(new java.math.BigDecimal(v1_3.res), ((v0_3.getMaxCoeffLength() + 1) + v13_6));
            boolean v3_10 = v3_9.mult(v4_8);
            v3_10.add(v1_11.mult(v0_3));
            v3_10.halve();
            v1_14 = v3_10.round();
        } else {
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_15 = new int[v7_0];
            boolean v3_11 = new int[v7_0];
            v1_15[0] = v11_1.coeffs[0];
            v3_11[0] = v2_8.coeffs[0];
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_12 = 1;
            while (v5_12 < v7_0) {
                org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v14_6 = (v7_0 - v5_12);
                v1_15[v5_12] = v11_1.coeffs[v14_6];
                v3_11[v5_12] = v2_8.coeffs[v14_6];
                v5_12++;
            }
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_14 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v1_15);
            org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator v1_18 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v3_11);
            boolean v3_12 = v12_1.mult(v5_14);
            v3_12.add(v6_5.mult(v1_18));
            boolean v3_13 = v3_12.resultant();
            org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v5_15 = v5_14.mult(v4_8);
            v5_15.add(v1_18.mult(v0_3));
            v1_14 = v5_15.mult(v3_13.rho);
            v1_14.div(v3_13.res);
        }
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v4_12;
        boolean v3_18;
        boolean v3_16 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v4_8.clone());
        v3_16.sub(v12_1.mult(v1_14));
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v0_5 = ((org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial) v0_3.clone());
        v0_5.sub(v6_5.mult(v1_14));
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v13_9 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v3_16);
        org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial v14_5 = new org.spongycastle.pqc.math.ntru.polynomial.IntegerPolynomial(v0_5);
        this.minimizeFG(v11_1, v2_8, v13_9, v14_5, v7_0);
        if (v18_0 != 0) {
            v4_12 = v13_9.mult(v10_1, v9_1);
            v3_18 = v6_5;
        } else {
            v4_12 = v6_5.mult(v10_1, v9_1);
            v3_18 = v13_9;
        }
        v4_12.modPositive(v9_1);
        org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis v9_0 = new org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyPairGenerator$FGBasis;
        v9_0(this, v12_1, v3_18, v4_12, v13_9, v14_5, this.params);
        return v9_0;
    }

Method org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyGenerationParameters.<init>() calling method java.security.SecureRandom.<init>()


    public NTRUSigningKeyGenerationParameters(java.io.InputStream p4)
    {
        super(new java.security.SecureRandom(), 0);
        super.signFailTolerance = 100;
        super.bitsF = 6;
        java.io.DataInputStream v0_5 = new java.io.DataInputStream(p4);
        super.N = v0_5.readInt();
        super.q = v0_5.readInt();
        super.d = v0_5.readInt();
        super.d1 = v0_5.readInt();
        super.d2 = v0_5.readInt();
        super.d3 = v0_5.readInt();
        super.B = v0_5.readInt();
        super.basisType = v0_5.readInt();
        super.beta = v0_5.readDouble();
        super.normBound = v0_5.readDouble();
        super.keyNormBound = v0_5.readDouble();
        super.signFailTolerance = v0_5.readInt();
        super.primeCheck = v0_5.readBoolean();
        super.sparse = v0_5.readBoolean();
        super.bitsF = v0_5.readInt();
        super.keyGenAlg = v0_5.read();
        org.spongycastle.crypto.digests.SHA256Digest v4_14 = v0_5.readUTF();
        if (!"SHA-512".equals(v4_14)) {
            if ("SHA-256".equals(v4_14)) {
                super.hashAlg = new org.spongycastle.crypto.digests.SHA256Digest();
            }
        } else {
            super.hashAlg = new org.spongycastle.crypto.digests.SHA512Digest();
        }
        super.polyType = v0_5.read();
        super.init();
        return;
    }

Method org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyGenerationParameters.<init>() calling method java.security.SecureRandom.<init>()


    public NTRUSigningKeyGenerationParameters(int p4, int p5, int p6, int p7, int p8, int p9, int p10, double p11, double p13, double p15, boolean p17, boolean p18, int p19, org.spongycastle.crypto.Digest p20)
    {
        super(new java.security.SecureRandom(), p4);
        super.signFailTolerance = 100;
        super.bitsF = 6;
        super.N = p4;
        super.q = p5;
        super.d1 = p6;
        super.d2 = p7;
        super.d3 = p8;
        super.B = p9;
        super.basisType = p10;
        super.beta = p11;
        super.normBound = p13;
        super.keyNormBound = p15;
        super.primeCheck = p17;
        super.sparse = p18;
        super.keyGenAlg = p19;
        super.hashAlg = p20;
        super.polyType = 1;
        super.init();
        return;
    }

Method org.spongycastle.pqc.crypto.ntru.NTRUSigningKeyGenerationParameters.<init>() calling method java.security.SecureRandom.<init>()


    public NTRUSigningKeyGenerationParameters(int p4, int p5, int p6, int p7, int p8, double p9, double p11, double p13, boolean p15, boolean p16, int p17, org.spongycastle.crypto.Digest p18)
    {
        super(new java.security.SecureRandom(), p4);
        super.signFailTolerance = 100;
        super.bitsF = 6;
        super.N = p4;
        super.q = p5;
        super.d = p6;
        super.B = p7;
        super.basisType = p8;
        super.beta = p9;
        super.normBound = p11;
        super.keyNormBound = p13;
        super.primeCheck = p15;
        super.sparse = p16;
        super.keyGenAlg = p17;
        super.hashAlg = p18;
        super.polyType = 0;
        super.init();
        return;
    }

Method org.spongycastle.pqc.crypto.ntru.NTRUEngine.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p1, org.spongycastle.crypto.CipherParameters p2)
    {
        this.forEncryption = p1;
        if (p1 == null) {
            this.privKey = ((org.spongycastle.pqc.crypto.ntru.NTRUEncryptionPrivateKeyParameters) p2);
            this.params = this.privKey.getParameters();
        } else {
            if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.random = new java.security.SecureRandom();
                this.pubKey = ((org.spongycastle.pqc.crypto.ntru.NTRUEncryptionPublicKeyParameters) p2);
            } else {
                this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
                this.pubKey = ((org.spongycastle.pqc.crypto.ntru.NTRUEncryptionPublicKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
            }
            this.params = this.pubKey.getParameters();
        }
        return;
    }

Method org.spongycastle.pqc.crypto.ntru.NTRUEncryptionKeyGenerationParameters.<init>() calling method java.security.SecureRandom.<init>()


    public NTRUEncryptionKeyGenerationParameters(java.io.InputStream p3)
    {
        super(new java.security.SecureRandom(), -1);
        String v0_3 = new java.io.DataInputStream(p3);
        super.N = v0_3.readInt();
        super.q = v0_3.readInt();
        super.df = v0_3.readInt();
        super.df1 = v0_3.readInt();
        super.df2 = v0_3.readInt();
        super.df3 = v0_3.readInt();
        super.db = v0_3.readInt();
        super.dm0 = v0_3.readInt();
        super.c = v0_3.readInt();
        super.minCallsR = v0_3.readInt();
        super.minCallsMask = v0_3.readInt();
        super.hashSeed = v0_3.readBoolean();
        org.spongycastle.crypto.digests.SHA256Digest v3_13 = new byte[3];
        super.oid = v3_13;
        v0_3.readFully(super.oid);
        super.sparse = v0_3.readBoolean();
        super.fastFp = v0_3.readBoolean();
        super.polyType = v0_3.read();
        org.spongycastle.crypto.digests.SHA256Digest v3_18 = v0_3.readUTF();
        if (!"SHA-512".equals(v3_18)) {
            if ("SHA-256".equals(v3_18)) {
                super.hashAlg = new org.spongycastle.crypto.digests.SHA256Digest();
            }
        } else {
            super.hashAlg = new org.spongycastle.crypto.digests.SHA512Digest();
        }
        super.init();
        return;
    }

Method org.spongycastle.pqc.crypto.ntru.NTRUEncryptionKeyGenerationParameters.<init>() calling method java.security.SecureRandom.<init>()


    public NTRUEncryptionKeyGenerationParameters(int p2, int p3, int p4, int p5, int p6, int p7, int p8, int p9, boolean p10, byte[] p11, boolean p12, boolean p13, org.spongycastle.crypto.Digest p14)
    {
        super(new java.security.SecureRandom(), p6);
        super.N = p2;
        super.q = p3;
        super.df = p4;
        super.db = p6;
        super.dm0 = p5;
        super.c = p7;
        super.minCallsR = p8;
        super.minCallsMask = p9;
        super.hashSeed = p10;
        super.oid = p11;
        super.sparse = p12;
        super.fastFp = p13;
        super.polyType = 0;
        super.hashAlg = p14;
        super.init();
        return;
    }

Method org.spongycastle.pqc.crypto.ntru.NTRUEncryptionKeyGenerationParameters.<init>() calling method java.security.SecureRandom.<init>()


    public NTRUEncryptionKeyGenerationParameters(int p4, int p5, int p6, int p7, int p8, int p9, int p10, int p11, int p12, int p13, boolean p14, byte[] p15, boolean p16, boolean p17, org.spongycastle.crypto.Digest p18)
    {
        super(new java.security.SecureRandom(), p10);
        super.N = p4;
        super.q = p5;
        super.df1 = p6;
        super.df2 = p7;
        super.df3 = p8;
        super.db = p10;
        super.dm0 = p9;
        super.c = p11;
        super.minCallsR = p12;
        super.minCallsMask = p13;
        super.hashSeed = p14;
        super.oid = p15;
        super.sparse = p16;
        super.fastFp = p17;
        super.polyType = 1;
        super.hashAlg = p18;
        super.init();
        return;
    }

Method org.spongycastle.pqc.crypto.mceliece.McEliecePointchevalCipher.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p1, org.spongycastle.crypto.CipherParameters p2)
    {
        this.forEncryption = p1;
        if (p1 == null) {
            this.key = ((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PrivateKeyParameters) p2);
            this.initCipherDecrypt(((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PrivateKeyParameters) this.key));
        } else {
            if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.sr = new java.security.SecureRandom();
                this.key = ((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters) p2);
                this.initCipherEncrypt(((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters) this.key));
            } else {
                this.sr = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
                this.key = ((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
                this.initCipherEncrypt(((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters) this.key));
            }
        }
        return;
    }

Method org.spongycastle.pqc.crypto.mceliece.McEliecePointchevalCipher.initCipherEncrypt() calling method java.security.SecureRandom.<init>()


    private void initCipherEncrypt(org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters p2)
    {
        int v0_0 = this.sr;
        if (v0_0 == 0) {
            v0_0 = new java.security.SecureRandom();
        }
        this.sr = v0_0;
        this.messDigest = org.spongycastle.pqc.crypto.mceliece.Utils.getDigest(p2.getDigest());
        this.n = p2.getN();
        this.k = p2.getK();
        this.t = p2.getT();
        return;
    }

Method org.spongycastle.pqc.crypto.mceliece.McElieceKobaraImaiCipher.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p1, org.spongycastle.crypto.CipherParameters p2)
    {
        this.forEncryption = p1;
        if (p1 == null) {
            this.key = ((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PrivateKeyParameters) p2);
            this.initCipherDecrypt(((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PrivateKeyParameters) this.key));
        } else {
            if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.sr = new java.security.SecureRandom();
                this.key = ((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters) p2);
                this.initCipherEncrypt(((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters) this.key));
            } else {
                this.sr = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
                this.key = ((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
                this.initCipherEncrypt(((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters) this.key));
            }
        }
        return;
    }

Method org.spongycastle.pqc.crypto.mceliece.McElieceKeyPairGenerator.initializeDefault() calling method java.security.SecureRandom.<init>()


    private void initializeDefault()
    {
        this.initialize(new org.spongycastle.pqc.crypto.mceliece.McElieceKeyGenerationParameters(new java.security.SecureRandom(), new org.spongycastle.pqc.crypto.mceliece.McElieceParameters()));
        return;
    }

Method org.spongycastle.pqc.crypto.mceliece.McElieceKeyPairGenerator.initialize() calling method java.security.SecureRandom.<init>()


    private void initialize(org.spongycastle.crypto.KeyGenerationParameters p1)
    {
        this.mcElieceParams = ((org.spongycastle.pqc.crypto.mceliece.McElieceKeyGenerationParameters) p1);
        this.random = new java.security.SecureRandom();
        this.m = this.mcElieceParams.getParameters().getM();
        this.n = this.mcElieceParams.getParameters().getN();
        this.t = this.mcElieceParams.getParameters().getT();
        this.fieldPoly = this.mcElieceParams.getParameters().getFieldPoly();
        this.initialized = 1;
        return;
    }

Method org.spongycastle.pqc.crypto.mceliece.McElieceFujisakiCipher.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p1, org.spongycastle.crypto.CipherParameters p2)
    {
        this.forEncryption = p1;
        if (p1 == null) {
            this.key = ((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PrivateKeyParameters) p2);
            this.initCipherDecrypt(((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PrivateKeyParameters) this.key));
        } else {
            if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.sr = new java.security.SecureRandom();
                this.key = ((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters) p2);
                this.initCipherEncrypt(((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters) this.key));
            } else {
                this.sr = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
                this.key = ((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
                this.initCipherEncrypt(((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters) this.key));
            }
        }
        return;
    }

Method org.spongycastle.pqc.crypto.mceliece.McElieceFujisakiCipher.initCipherEncrypt() calling method java.security.SecureRandom.<init>()


    private void initCipherEncrypt(org.spongycastle.pqc.crypto.mceliece.McElieceCCA2PublicKeyParameters p2)
    {
        int v0_0 = this.sr;
        if (v0_0 == 0) {
            v0_0 = new java.security.SecureRandom();
        }
        this.sr = v0_0;
        this.messDigest = org.spongycastle.pqc.crypto.mceliece.Utils.getDigest(p2.getDigest());
        this.n = p2.getN();
        this.k = p2.getK();
        this.t = p2.getT();
        return;
    }

Method org.spongycastle.pqc.crypto.mceliece.McElieceCipher.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p1, org.spongycastle.crypto.CipherParameters p2)
    {
        this.forEncryption = p1;
        if (p1 == null) {
            this.key = ((org.spongycastle.pqc.crypto.mceliece.McEliecePrivateKeyParameters) p2);
            this.initCipherDecrypt(((org.spongycastle.pqc.crypto.mceliece.McEliecePrivateKeyParameters) this.key));
        } else {
            if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.sr = new java.security.SecureRandom();
                this.key = ((org.spongycastle.pqc.crypto.mceliece.McEliecePublicKeyParameters) p2);
                this.initCipherEncrypt(((org.spongycastle.pqc.crypto.mceliece.McEliecePublicKeyParameters) this.key));
            } else {
                this.sr = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
                this.key = ((org.spongycastle.pqc.crypto.mceliece.McEliecePublicKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
                this.initCipherEncrypt(((org.spongycastle.pqc.crypto.mceliece.McEliecePublicKeyParameters) this.key));
            }
        }
        return;
    }

Method org.spongycastle.pqc.crypto.mceliece.McElieceCipher.initCipherEncrypt() calling method java.security.SecureRandom.<init>()


    private void initCipherEncrypt(org.spongycastle.pqc.crypto.mceliece.McEliecePublicKeyParameters p2)
    {
        int v0_0 = this.sr;
        if (v0_0 == 0) {
            v0_0 = new java.security.SecureRandom();
        }
        this.sr = v0_0;
        this.n = p2.getN();
        this.k = p2.getK();
        this.t = p2.getT();
        this.cipherTextSize = (this.n >> 3);
        this.maxPlainTextSize = (this.k >> 3);
        return;
    }

Method org.spongycastle.pqc.crypto.mceliece.McElieceCCA2KeyPairGenerator.init() calling method java.security.SecureRandom.<init>()


    public void init(org.spongycastle.crypto.KeyGenerationParameters p1)
    {
        this.mcElieceCCA2Params = ((org.spongycastle.pqc.crypto.mceliece.McElieceCCA2KeyGenerationParameters) p1);
        this.random = new java.security.SecureRandom();
        this.m = this.mcElieceCCA2Params.getParameters().getM();
        this.n = this.mcElieceCCA2Params.getParameters().getN();
        this.t = this.mcElieceCCA2Params.getParameters().getT();
        this.fieldPoly = this.mcElieceCCA2Params.getParameters().getFieldPoly();
        this.initialized = 1;
        return;
    }

Method org.spongycastle.pqc.crypto.mceliece.McElieceCCA2KeyPairGenerator.initializeDefault() calling method java.security.SecureRandom.<init>()


    private void initializeDefault()
    {
        this.init(new org.spongycastle.pqc.crypto.mceliece.McElieceCCA2KeyGenerationParameters(new java.security.SecureRandom(), new org.spongycastle.pqc.crypto.mceliece.McElieceCCA2Parameters()));
        return;
    }

Method org.spongycastle.pqc.crypto.gmss.GMSSSigner.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p1, org.spongycastle.crypto.CipherParameters p2)
    {
        if (p1 == null) {
            this.key = ((org.spongycastle.pqc.crypto.gmss.GMSSPublicKeyParameters) p2);
            this.initVerify();
        } else {
            if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.random = new java.security.SecureRandom();
                this.key = ((org.spongycastle.pqc.crypto.gmss.GMSSPrivateKeyParameters) p2);
                this.initSign();
            } else {
                this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
                this.key = ((org.spongycastle.pqc.crypto.gmss.GMSSPrivateKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
                this.initSign();
            }
        }
        return;
    }

Method org.spongycastle.pqc.crypto.gmss.GMSSKeyPairGenerator.initialize() calling method java.security.SecureRandom.<init>()


    public void initialize(org.spongycastle.crypto.KeyGenerationParameters p5)
    {
        this.gmssParams = ((org.spongycastle.pqc.crypto.gmss.GMSSKeyGenerationParameters) p5);
        this.gmssPS = new org.spongycastle.pqc.crypto.gmss.GMSSParameters(this.gmssParams.getParameters().getNumOfLayers(), this.gmssParams.getParameters().getHeightOfTrees(), this.gmssParams.getParameters().getWinternitzParameter(), this.gmssParams.getParameters().getK());
        this.numLayer = this.gmssPS.getNumOfLayers();
        this.heightOfTrees = this.gmssPS.getHeightOfTrees();
        this.otsIndex = this.gmssPS.getWinternitzParameter();
        this.K = this.gmssPS.getK();
        this.currentSeeds = ((byte[][]) reflect.Array.newInstance(byte, new int[] {this.numLayer, this.mdLength})));
        this.nextNextSeeds = ((byte[][]) reflect.Array.newInstance(byte, new int[] {(this.numLayer - 1), this.mdLength})));
        java.security.SecureRandom v5_22 = new java.security.SecureRandom();
        int v1_4 = 0;
        while (v1_4 < this.numLayer) {
            v5_22.nextBytes(this.currentSeeds[v1_4]);
            this.gmssRandom.nextSeed(this.currentSeeds[v1_4]);
            v1_4++;
        }
        this.initialized = 1;
        return;
    }

Method org.spongycastle.pqc.crypto.gmss.GMSSKeyPairGenerator.initializeDefault() calling method java.security.SecureRandom.<init>()


    private void initializeDefault()
    {
        int[] v1 = new int[4];
        v1 = {10, 10, 10, 10};
        int[] v2 = new int[4];
        v2 = {3, 3, 3, 3};
        int[] v0_1 = new int[4];
        v0_1 = {2, 2, 2, 2};
        this.initialize(new org.spongycastle.pqc.crypto.gmss.GMSSKeyGenerationParameters(new java.security.SecureRandom(), new org.spongycastle.pqc.crypto.gmss.GMSSParameters(v1.length, v1, v2, v0_1)));
        return;
    }

Method org.spongycastle.pkcs.jcajce.JcePKCS12MacCalculatorBuilder.build() calling method java.security.SecureRandom.<init>()


    public org.spongycastle.operator.MacCalculator build(char[] p5)
    {
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        try {
            org.spongycastle.operator.OperatorCreationException v0_1 = this.helper.createMac(this.algorithm.getId());
            this.saltLength = v0_1.getMacLength();
            String v1_2 = new byte[this.saltLength];
            this.random.nextBytes(v1_2);
            String v2_2 = new javax.crypto.spec.PBEParameterSpec(v1_2, this.iterationCount);
            org.spongycastle.jcajce.PKCS12Key v3_2 = new org.spongycastle.jcajce.PKCS12Key(p5);
            v0_1.init(v3_2, v2_2);
            return new org.spongycastle.pkcs.jcajce.JcePKCS12MacCalculatorBuilder$1(this, v1_2, v0_1, v3_2);
        } catch (Exception v5_3) {
            String v1_4 = new StringBuilder();
            v1_4.append("unable to create MAC calculator: ");
            v1_4.append(v5_3.getMessage());
            throw new org.spongycastle.operator.OperatorCreationException(v1_4.toString(), v5_3);
        }
    }

Method org.spongycastle.pkcs.bc.BcPKCS12MacCalculatorBuilder.build() calling method java.security.SecureRandom.<init>()


    public org.spongycastle.operator.MacCalculator build(char[] p6)
    {
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        byte[] v0_4 = new byte[this.saltLength];
        this.random.nextBytes(v0_4);
        return org.spongycastle.pkcs.bc.PKCS12PBEUtils.createMacCalculator(this.algorithmIdentifier.getAlgorithm(), this.digest, new org.spongycastle.asn1.pkcs.PKCS12PBEParams(v0_4, this.iterationCount), p6);
    }

Method org.spongycastle.util.test.FixedSecureRandom.<init>() calling method java.security.SecureRandom.<init>()


    public FixedSecureRandom(org.spongycastle.util.test.FixedSecureRandom$Source[] p9)
    {
        super(0, new org.spongycastle.util.test.FixedSecureRandom$DummyProvider());
        String v0_5 = new java.io.ByteArrayOutputStream();
        int v3 = 0;
        if (!org.spongycastle.util.test.FixedSecureRandom.isRegularStyle) {
            if (!org.spongycastle.util.test.FixedSecureRandom.isAndroidStyle) {
                throw new IllegalStateException("Unrecognized BigInteger implementation");
            } else {
                int v1_1 = 0;
                while (v1_1 != p9.length) {
                    try {
                        if (!(p9[v1_1] instanceof org.spongycastle.util.test.FixedSecureRandom$BigInteger)) {
                            v0_5.write(p9[v1_1].data);
                        } else {
                            int v4_6 = p9[v1_1].data;
                            int v5_3 = (v4_6.length - (v4_6.length % 4));
                            int v6_3 = 0;
                            while (v6_3 < v5_3) {
                                v6_3 += 4;
                                v0_5.write(v4_6, (v4_6.length - v6_3), 4);
                            }
                            if ((v4_6.length - v5_3) != 0) {
                                int v6_6 = 0;
                                while (v6_6 != (4 - (v4_6.length - v5_3))) {
                                    v0_5.write(0);
                                    v6_6++;
                                }
                            }
                            int v6_7 = 0;
                            while (v6_7 != (v4_6.length - v5_3)) {
                                v0_5.write(v4_6[(v5_3 + v6_7)]);
                                v6_7++;
                            }
                        }
                        v1_1++;
                    } catch (java.io.IOException) {
                        throw new IllegalArgumentException("can\'t save value source.");
                    }
                }
            }
        } else {
            if (!org.spongycastle.util.test.FixedSecureRandom.isClasspathStyle) {
                while (v3 != p9.length) {
                    try {
                        v0_5.write(p9[v3].data);
                        v3++;
                    } catch (java.io.IOException) {
                        throw new IllegalArgumentException("can\'t save value source.");
                    }
                }
                super._data = v0_5.toByteArray();
                return;
            }
            while (v3 != p9.length) {
                try {
                    if (!(p9[v3] instanceof org.spongycastle.util.test.FixedSecureRandom$BigInteger)) {
                        v0_5.write(p9[v3].data);
                    } else {
                        int v1_14 = p9[v3].data;
                        int v4_8 = (v1_14.length - (v1_14.length % 4));
                        int v5_1 = ((v1_14.length - v4_8) - 1);
                        while (v5_1 >= 0) {
                            v0_5.write(v1_14[v5_1]);
                            v5_1--;
                        }
                        int v5_0 = (v1_14.length - v4_8);
                        while (v5_0 < v1_14.length) {
                            v0_5.write(v1_14, v5_0, 4);
                            v5_0 += 4;
                        }
                    }
                    v3++;
                } catch (java.io.IOException) {
                    throw new IllegalArgumentException("can\'t save value source.");
                }
            }
        }
        super._data = v0_5.toByteArray();
        return;
    }

Method org.spongycastle.util.test.FixedSecureRandom$RandomChecker.<init>() calling method java.security.SecureRandom.<init>()


    FixedSecureRandom$RandomChecker()
    {
        super(0, new org.spongycastle.util.test.FixedSecureRandom$DummyProvider());
        super.data = org.spongycastle.util.encoders.Hex.decode("01020304ffffffff0506070811111111");
        super.index = 0;
        return;
    }

Method org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial.generateRandomSmall() calling method java.security.SecureRandom.<init>()


    static org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial generateRandomSmall(int p4, int p5, int p6)
    {
        java.util.ArrayList v0_1 = new java.util.ArrayList();
        int v1 = 0;
        java.math.BigInteger v2_2 = 0;
        while (v2_2 < p5) {
            v0_1.add(org.spongycastle.pqc.math.ntru.polynomial.Constants.BIGINT_ONE);
            v2_2++;
        }
        org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial v5_6 = 0;
        while (v5_6 < p6) {
            v0_1.add(java.math.BigInteger.valueOf(-1));
            v5_6++;
        }
        while (v0_1.size() < p4) {
            v0_1.add(org.spongycastle.pqc.math.ntru.polynomial.Constants.BIGINT_ZERO);
        }
        java.util.Collections.shuffle(v0_1, new java.security.SecureRandom());
        org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial v5_4 = new org.spongycastle.pqc.math.ntru.polynomial.BigIntPolynomial(p4);
        while (v1 < v0_1.size()) {
            v5_4.coeffs[v1] = ((java.math.BigInteger) v0_1.get(v1));
            v1++;
        }
        return v5_4;
    }

Method org.spongycastle.pqc.math.linearalgebra.IntegerFunctions.randomize() calling method java.security.SecureRandom.<init>()


    public static java.math.BigInteger randomize(java.math.BigInteger p4, java.security.SecureRandom p5)
    {
        int v0 = p4.bitLength();
        java.math.BigInteger v1_1 = java.math.BigInteger.valueOf(0);
        if (p5 == null) {
            p5 = org.spongycastle.pqc.math.linearalgebra.IntegerFunctions.sr;
            if (p5 == null) {
                p5 = new java.security.SecureRandom();
            }
        }
        int v2 = 0;
        while (v2 < 20) {
            v1_1 = new java.math.BigInteger(v0, p5);
            if (v1_1.compareTo(p4) >= 0) {
                v2++;
            } else {
                return v1_1;
            }
        }
        return v1_1.mod(p4);
    }

Method org.spongycastle.pqc.math.linearalgebra.IntegerFunctions.randomize() calling method java.security.SecureRandom.<init>()


    public static java.math.BigInteger randomize(java.math.BigInteger p1)
    {
        if (org.spongycastle.pqc.math.linearalgebra.IntegerFunctions.sr == null) {
            org.spongycastle.pqc.math.linearalgebra.IntegerFunctions.sr = new java.security.SecureRandom();
        }
        return org.spongycastle.pqc.math.linearalgebra.IntegerFunctions.randomize(p1, org.spongycastle.pqc.math.linearalgebra.IntegerFunctions.sr);
    }

Method org.spongycastle.pqc.math.linearalgebra.GF2mField.getRandomNonZeroElement() calling method java.security.SecureRandom.<init>()


    public int getRandomNonZeroElement()
    {
        return this.getRandomNonZeroElement(new java.security.SecureRandom());
    }

Method org.spongycastle.pqc.jcajce.provider.rainbow.RainbowKeyPairGeneratorSpi.<init>() calling method java.security.SecureRandom.<init>()


    public RainbowKeyPairGeneratorSpi()
    {
        super("Rainbow");
        super.engine = new org.spongycastle.pqc.crypto.rainbow.RainbowKeyPairGenerator();
        super.strength = 1024;
        super.random = new java.security.SecureRandom();
        super.initialised = 0;
        return;
    }

Method org.spongycastle.pkcs.jcajce.JcePKCSPBEOutputEncryptorBuilder.build() calling method java.security.SecureRandom.<init>()


    public org.spongycastle.operator.OutputEncryptor build(char[] p9)
    {
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        String v0_7 = new byte[20];
        this.random.nextBytes(v0_7);
        try {
            org.spongycastle.asn1.x509.AlgorithmIdentifier v2_5;
            javax.crypto.Cipher v1_8;
            if (!this.algorithm.on(org.spongycastle.asn1.pkcs.PKCSObjectIdentifiers.pkcs_12PbeIds)) {
                if (!this.algorithm.equals(org.spongycastle.asn1.pkcs.PKCSObjectIdentifiers.id_PBES2)) {
                    throw new org.spongycastle.operator.OperatorCreationException("unrecognised algorithm");
                } else {
                    javax.crypto.Cipher v1_5 = this.helper.createSecretKeyFactory(org.spongycastle.asn1.pkcs.PKCSObjectIdentifiers.id_PBKDF2.getId()).generateSecret(new javax.crypto.spec.PBEKeySpec(p9, v0_7, this.iterationCount, this.keySizeProvider.getKeySize(new org.spongycastle.asn1.x509.AlgorithmIdentifier(this.keyEncAlgorithm))));
                    javax.crypto.Cipher v3_6 = this.helper.createCipher(this.keyEncAlgorithm.getId());
                    v3_6.init(1, v1_5, this.random);
                    v2_5 = new org.spongycastle.asn1.x509.AlgorithmIdentifier(this.algorithm, new org.spongycastle.asn1.pkcs.PBES2Parameters(new org.spongycastle.asn1.pkcs.KeyDerivationFunc(org.spongycastle.asn1.pkcs.PKCSObjectIdentifiers.id_PBKDF2, new org.spongycastle.asn1.pkcs.PBKDF2Params(v0_7, this.iterationCount)), new org.spongycastle.asn1.pkcs.EncryptionScheme(this.keyEncAlgorithm, org.spongycastle.asn1.ASN1Primitive.fromByteArray(v3_6.getParameters().getEncoded()))));
                    v1_8 = v3_6;
                }
            } else {
                v1_8 = this.helper.createCipher(this.algorithm.getId());
                v1_8.init(1, new org.spongycastle.jcajce.PKCS12KeyWithParameters(p9, v0_7, this.iterationCount));
                v2_5 = new org.spongycastle.asn1.x509.AlgorithmIdentifier(this.algorithm, new org.spongycastle.asn1.pkcs.PKCS12PBEParams(v0_7, this.iterationCount));
            }
        } catch (org.spongycastle.operator.OperatorCreationException v9_3) {
            javax.crypto.Cipher v1_13 = new StringBuilder();
            v1_13.append("unable to create OutputEncryptor: ");
            v1_13.append(v9_3.getMessage());
            throw new org.spongycastle.operator.OperatorCreationException(v1_13.toString(), v9_3);
        }
        return new org.spongycastle.pkcs.jcajce.JcePKCSPBEOutputEncryptorBuilder$1(this, v2_5, v1_8, p9);
    }

Method org.spongycastle.pkcs.bc.BcPKCS12PBEOutputEncryptorBuilder.build() calling method java.security.SecureRandom.<init>()


    public org.spongycastle.operator.OutputEncryptor build(char[] p5)
    {
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        org.spongycastle.pkcs.bc.BcPKCS12PBEOutputEncryptorBuilder$1 v0_8 = new byte[20];
        this.random.nextBytes(v0_8);
        org.spongycastle.asn1.pkcs.PKCS12PBEParams v1_0 = new org.spongycastle.asn1.pkcs.PKCS12PBEParams(v0_8, this.iterationCount);
        this.engine.init(1, org.spongycastle.pkcs.bc.PKCS12PBEUtils.createCipherParameters(this.algorithm, this.digest, this.engine.getBlockSize(), v1_0, p5));
        return new org.spongycastle.pkcs.bc.BcPKCS12PBEOutputEncryptorBuilder$1(this, v1_0, p5);
    }

Method org.spongycastle.openpgp.operator.bc.BcPublicKeyKeyEncryptionMethodGenerator.encryptSessionInfo() calling method java.security.SecureRandom.<init>()


    protected byte[] encryptSessionInfo(org.spongycastle.openpgp.PGPPublicKey p9, byte[] p10)
    {
        try {
            if (p9.getAlgorithm() == 18) {
                byte[] v0_1 = ((org.spongycastle.bcpg.ECDHPublicBCPGKey) p9.getPublicKeyPacket().getKey());
                org.spongycastle.crypto.params.ParametersWithRandom v1_11 = org.spongycastle.openpgp.operator.bc.BcUtil.getX9Parameters(v0_1.getCurveOID());
                java.security.SecureRandom v4_4 = new org.spongycastle.crypto.params.ECDomainParameters(v1_11.getCurve(), v1_11.getG(), v1_11.getN());
                org.spongycastle.openpgp.operator.bc.RFC6637KDFCalculator v5_2 = new org.spongycastle.crypto.generators.ECKeyPairGenerator();
                v5_2.init(new org.spongycastle.crypto.params.ECKeyGenerationParameters(v4_4, this.random));
                java.security.SecureRandom v4_7 = new org.spongycastle.crypto.generators.EphemeralKeyPairGenerator(v5_2, new org.spongycastle.openpgp.operator.bc.BcPublicKeyKeyEncryptionMethodGenerator$1(this)).generate();
                org.spongycastle.crypto.params.KeyParameter v6_10 = new org.spongycastle.crypto.params.KeyParameter(new org.spongycastle.openpgp.operator.bc.RFC6637KDFCalculator(new org.spongycastle.openpgp.operator.bc.BcPGPDigestCalculatorProvider().get(v0_1.getHashAlgorithm()), v0_1.getSymmetricKeyAlgorithm()).createKey(org.spongycastle.openpgp.operator.bc.BcUtil.decodePoint(v0_1.getEncodedPoint(), v1_11.getCurve()).multiply(((org.spongycastle.crypto.params.ECPrivateKeyParameters) v4_7.getKeyPair().getPrivate()).getD()).normalize(), org.spongycastle.openpgp.operator.RFC6637Utils.createUserKeyingMaterial(p9.getPublicKeyPacket(), new org.spongycastle.openpgp.operator.bc.BcKeyFingerprintCalculator())));
                byte[] v9_10 = org.spongycastle.openpgp.operator.bc.BcImplProvider.createWrapper(v0_1.getSymmetricKeyAlgorithm());
                v9_10.init(1, new org.spongycastle.crypto.params.ParametersWithRandom(v6_10, this.random));
                int v10_7 = org.spongycastle.openpgp.operator.PGPPad.padSessionData(p10);
                byte[] v9_11 = v9_10.wrap(v10_7, 0, v10_7.length);
                int v10_10 = new org.spongycastle.bcpg.MPInteger(new java.math.BigInteger(1, v4_7.getEncodedPublicKey())).getEncoded();
                byte[] v0_20 = new byte[((v10_10.length + 1) + v9_11.length)];
                System.arraycopy(v10_10, 0, v0_20, 0, v10_10.length);
                v0_20[v10_10.length] = ((byte) v9_11.length);
                System.arraycopy(v9_11, 0, v0_20, (v10_10.length + 1), v9_11.length);
                return v0_20;
            } else {
                byte[] v0_3 = org.spongycastle.openpgp.operator.bc.BcImplProvider.createPublicKeyCipher(p9.getAlgorithm());
                byte[] v9_1 = this.keyConverter.getPublicKey(p9);
                if (this.random == null) {
                    this.random = new java.security.SecureRandom();
                }
                v0_3.init(1, new org.spongycastle.crypto.params.ParametersWithRandom(v9_1, this.random));
                return v0_3.processBlock(p10, 0, p10.length);
            }
        } catch (byte[] v9_5) {
            byte[] v0_8 = new StringBuilder();
            v0_8.append("exception encrypting session info: ");
            v0_8.append(v9_5.getMessage());
            throw new org.spongycastle.openpgp.PGPException(v0_8.toString(), v9_5);
        } catch (byte[] v9_4) {
            byte[] v0_5 = new StringBuilder();
            v0_5.append("exception encrypting session info: ");
            v0_5.append(v9_4.getMessage());
            throw new org.spongycastle.openpgp.PGPException(v0_5.toString(), v9_4);
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.util.BaseStreamCipher.engineInit() calling method java.security.SecureRandom.<init>()


    protected void engineInit(int p10, java.security.Key p11, java.security.spec.AlgorithmParameterSpec p12, java.security.SecureRandom p13)
    {
        this.pbeSpec = 0;
        this.pbeAlgorithm = 0;
        this.engineParams = 0;
        if (!(p11 instanceof javax.crypto.SecretKey)) {
            org.spongycastle.crypto.params.ParametersWithIV v12_12 = new StringBuilder();
            v12_12.append("Key for algorithm ");
            v12_12.append(p11.getAlgorithm());
            v12_12.append(" not suitable for symmetric enryption.");
            throw new java.security.InvalidKeyException(v12_12.toString());
        } else {
            org.spongycastle.crypto.params.ParametersWithIV v12_5;
            if (!(p11 instanceof org.spongycastle.jcajce.PKCS12Key)) {
                if (!(p11 instanceof org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey)) {
                    if (p12 != null) {
                        if (!(p12 instanceof javax.crypto.spec.IvParameterSpec)) {
                            throw new java.security.InvalidAlgorithmParameterException("unknown parameter type.");
                        } else {
                            org.spongycastle.crypto.CipherParameters v0_9 = new org.spongycastle.crypto.params.ParametersWithIV(new org.spongycastle.crypto.params.KeyParameter(p11.getEncoded()), ((javax.crypto.spec.IvParameterSpec) p12).getIV());
                            this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v0_9);
                            v12_5 = v0_9;
                        }
                    } else {
                        if (this.digest > 0) {
                            throw new java.security.InvalidKeyException("Algorithm requires a PBE key");
                        } else {
                            v12_5 = new org.spongycastle.crypto.params.KeyParameter(p11.getEncoded());
                        }
                    }
                } else {
                    if (((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p11).getOID() == null) {
                        this.pbeAlgorithm = ((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p11).getAlgorithm();
                    } else {
                        this.pbeAlgorithm = ((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p11).getOID().getId();
                    }
                    if (((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p11).getParam() == null) {
                        if (!(p12 instanceof javax.crypto.spec.PBEParameterSpec)) {
                            throw new java.security.InvalidAlgorithmParameterException("PBE requires PBE parameters to be set.");
                        } else {
                            org.spongycastle.crypto.CipherParameters v0_19 = org.spongycastle.jcajce.provider.symmetric.util.PBE$Util.makePBEParameters(((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p11), p12, this.cipher.getAlgorithmName());
                            this.pbeSpec = ((javax.crypto.spec.PBEParameterSpec) p12);
                            v12_5 = v0_19;
                        }
                    } else {
                        v12_5 = ((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p11).getParam();
                        this.pbeSpec = new javax.crypto.spec.PBEParameterSpec(((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p11).getSalt(), ((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p11).getIterationCount());
                    }
                    if (((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p11).getIvSize() != 0) {
                        this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v12_5);
                    }
                }
            } else {
                this.pbeSpec = ((javax.crypto.spec.PBEParameterSpec) p12);
                if (((((org.spongycastle.jcajce.PKCS12Key) p11) instanceof org.spongycastle.jcajce.PKCS12KeyWithParameters)) && (this.pbeSpec == null)) {
                    this.pbeSpec = new javax.crypto.spec.PBEParameterSpec(((org.spongycastle.jcajce.PKCS12KeyWithParameters) ((org.spongycastle.jcajce.PKCS12Key) p11)).getSalt(), ((org.spongycastle.jcajce.PKCS12KeyWithParameters) ((org.spongycastle.jcajce.PKCS12Key) p11)).getIterationCount());
                }
                v12_5 = org.spongycastle.jcajce.provider.symmetric.util.PBE$Util.makePBEParameters(((org.spongycastle.jcajce.PKCS12Key) p11).getEncoded(), 2, this.digest, this.keySizeInBits, (this.ivLength * 8), this.pbeSpec, this.cipher.getAlgorithmName());
            }
            if ((this.ivLength != 0) && (!(v12_5 instanceof org.spongycastle.crypto.params.ParametersWithIV))) {
                if (p13 == null) {
                    p13 = new java.security.SecureRandom();
                }
                if ((p10 != 1) && (p10 != 3)) {
                    throw new java.security.InvalidAlgorithmParameterException("no IV set when one expected");
                } else {
                    String v11_11 = new byte[this.ivLength];
                    p13.nextBytes(v11_11);
                    org.spongycastle.crypto.params.ParametersWithIV v13_3 = new org.spongycastle.crypto.params.ParametersWithIV(v12_5, v11_11);
                    this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v13_3);
                    v12_5 = v13_3;
                }
            }
            try {
                switch (p10) {
                    case 1:
                    case 3:
                        this.cipher.init(1, v12_5);
                        return;
                    case 2:
                    case 4:
                        this.cipher.init(0, v12_5);
                        return;
                    default:
                        org.spongycastle.crypto.params.ParametersWithIV v12_7 = new StringBuilder();
                        v12_7.append("unknown opmode ");
                        v12_7.append(p10);
                        v12_7.append(" passed");
                        throw new java.security.InvalidParameterException(v12_7.toString());
                }
            } catch (java.security.InvalidAlgorithmParameterException v10_7) {
            }
            throw new java.security.InvalidKeyException(v10_7.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineInit() calling method java.security.SecureRandom.<init>()


    protected void engineInit(int p18, java.security.Key p19, java.security.spec.AlgorithmParameterSpec p20, java.security.SecureRandom p21)
    {
        String v5_2 = 0;
        this.pbeSpec = 0;
        this.pbeAlgorithm = 0;
        this.engineParams = 0;
        this.aeadParams = 0;
        if (!(p19 instanceof javax.crypto.SecretKey)) {
            org.spongycastle.crypto.params.ParametersWithIV v3_1 = new StringBuilder();
            v3_1.append("Key for algorithm ");
            v3_1.append(p19.getAlgorithm());
            v3_1.append(" not suitable for symmetric enryption.");
            throw new java.security.InvalidKeyException(v3_1.toString());
        } else {
            if ((p20 == null) && (this.baseEngine.getAlgorithmName().startsWith("RC5-64"))) {
                throw new java.security.InvalidAlgorithmParameterException("RC5 requires an RC5ParametersSpec to be passed in.");
            } else {
                reflect.Method v6_51 = this.scheme;
                if ((v6_51 != 2) && (!(p19 instanceof org.spongycastle.jcajce.PKCS12Key))) {
                    if (!(p19 instanceof org.spongycastle.jcajce.PBKDF1Key)) {
                        if (!(p19 instanceof org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey)) {
                            if (!(p19 instanceof javax.crypto.interfaces.PBEKey)) {
                                if (!(p19 instanceof org.spongycastle.jcajce.spec.RepeatedSecretKeySpec)) {
                                    if ((v6_51 == null) || ((v6_51 == 4) || ((v6_51 == 1) || (v6_51 == 5)))) {
                                        throw new java.security.InvalidKeyException("Algorithm requires a PBE key");
                                    } else {
                                        v5_2 = new org.spongycastle.crypto.params.KeyParameter(p19.getEncoded());
                                    }
                                }
                            } else {
                                this.pbeSpec = ((javax.crypto.spec.PBEParameterSpec) p20);
                                if (((((javax.crypto.interfaces.PBEKey) p19) instanceof org.spongycastle.jcajce.PKCS12KeyWithParameters)) && (this.pbeSpec == null)) {
                                    this.pbeSpec = new javax.crypto.spec.PBEParameterSpec(((javax.crypto.interfaces.PBEKey) p19).getSalt(), ((javax.crypto.interfaces.PBEKey) p19).getIterationCount());
                                }
                                v5_2 = org.spongycastle.jcajce.provider.symmetric.util.PBE$Util.makePBEParameters(((javax.crypto.interfaces.PBEKey) p19).getEncoded(), this.scheme, this.digest, this.keySizeInBits, (this.ivLength * 8), this.pbeSpec, this.cipher.getAlgorithmName());
                                if ((v5_2 instanceof org.spongycastle.crypto.params.ParametersWithIV)) {
                                    this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v5_2);
                                }
                            }
                        } else {
                            if (((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p19).getOID() == null) {
                                this.pbeAlgorithm = ((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p19).getAlgorithm();
                            } else {
                                this.pbeAlgorithm = ((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p19).getOID().getId();
                            }
                            if (((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p19).getParam() == null) {
                                if (!(p20 instanceof javax.crypto.spec.PBEParameterSpec)) {
                                    throw new java.security.InvalidAlgorithmParameterException("PBE requires PBE parameters to be set.");
                                } else {
                                    this.pbeSpec = ((javax.crypto.spec.PBEParameterSpec) p20);
                                    v5_2 = org.spongycastle.jcajce.provider.symmetric.util.PBE$Util.makePBEParameters(((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p19), p20, this.cipher.getUnderlyingCipher().getAlgorithmName());
                                }
                            } else {
                                v5_2 = this.adjustParameters(p20, ((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p19).getParam());
                            }
                            if ((v5_2 instanceof org.spongycastle.crypto.params.ParametersWithIV)) {
                                this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v5_2);
                            }
                        }
                    } else {
                        if ((p20 instanceof javax.crypto.spec.PBEParameterSpec)) {
                            this.pbeSpec = ((javax.crypto.spec.PBEParameterSpec) p20);
                        }
                        if (((((org.spongycastle.jcajce.PBKDF1Key) p19) instanceof org.spongycastle.jcajce.PBKDF1KeyWithParameters)) && (this.pbeSpec == null)) {
                            this.pbeSpec = new javax.crypto.spec.PBEParameterSpec(((org.spongycastle.jcajce.PBKDF1KeyWithParameters) ((org.spongycastle.jcajce.PBKDF1Key) p19)).getSalt(), ((org.spongycastle.jcajce.PBKDF1KeyWithParameters) ((org.spongycastle.jcajce.PBKDF1Key) p19)).getIterationCount());
                        }
                        v5_2 = org.spongycastle.jcajce.provider.symmetric.util.PBE$Util.makePBEParameters(((org.spongycastle.jcajce.PBKDF1Key) p19).getEncoded(), 0, this.digest, this.keySizeInBits, (this.ivLength * 8), this.pbeSpec, this.cipher.getAlgorithmName());
                        if ((v5_2 instanceof org.spongycastle.crypto.params.ParametersWithIV)) {
                            this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v5_2);
                        }
                    }
                } else {
                    try {
                        if ((p20 instanceof javax.crypto.spec.PBEParameterSpec)) {
                            this.pbeSpec = ((javax.crypto.spec.PBEParameterSpec) p20);
                        }
                    } catch (Exception) {
                        throw new java.security.InvalidKeyException("PKCS12 requires a SecretKey/PBEKey");
                    }
                    reflect.Method v6_28 = (((javax.crypto.SecretKey) p19) instanceof javax.crypto.interfaces.PBEKey);
                    if ((v6_28 != null) && (this.pbeSpec == null)) {
                        this.pbeSpec = new javax.crypto.spec.PBEParameterSpec(((javax.crypto.interfaces.PBEKey) ((javax.crypto.SecretKey) p19)).getSalt(), ((javax.crypto.interfaces.PBEKey) ((javax.crypto.SecretKey) p19)).getIterationCount());
                    }
                    if ((this.pbeSpec == null) && (v6_28 == null)) {
                        throw new java.security.InvalidKeyException("Algorithm requires a PBE key");
                    } else {
                        if (!(p19 instanceof org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey)) {
                            v5_2 = org.spongycastle.jcajce.provider.symmetric.util.PBE$Util.makePBEParameters(((javax.crypto.SecretKey) p19).getEncoded(), 2, this.digest, this.keySizeInBits, (this.ivLength * 8), this.pbeSpec, this.cipher.getAlgorithmName());
                        } else {
                            if (((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p19).getParam() == null) {
                                v5_2 = org.spongycastle.jcajce.provider.symmetric.util.PBE$Util.makePBEParameters(((javax.crypto.SecretKey) p19).getEncoded(), 2, this.digest, this.keySizeInBits, (this.ivLength * 8), this.pbeSpec, this.cipher.getAlgorithmName());
                            } else {
                                v5_2 = ((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p19).getParam();
                            }
                        }
                        if ((v5_2 instanceof org.spongycastle.crypto.params.ParametersWithIV)) {
                            this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v5_2);
                        }
                    }
                }
                if (!(p20 instanceof javax.crypto.spec.IvParameterSpec)) {
                    if (!(p20 instanceof org.spongycastle.jcajce.spec.GOST28147ParameterSpec)) {
                        if (!(p20 instanceof javax.crypto.spec.RC2ParameterSpec)) {
                            if (!(p20 instanceof javax.crypto.spec.RC5ParameterSpec)) {
                                String v2_7 = org.spongycastle.jcajce.provider.symmetric.util.BaseBlockCipher.gcmSpecClass;
                                if ((v2_7 == null) || (!v2_7.isInstance(p20))) {
                                    if ((p20 != null) && (!(p20 instanceof javax.crypto.spec.PBEParameterSpec))) {
                                        throw new java.security.InvalidAlgorithmParameterException("unknown parameter type.");
                                    }
                                } else {
                                    if ((!this.isAEADModeName(this.modeName)) && (!(this.cipher instanceof org.spongycastle.jcajce.provider.symmetric.util.BaseBlockCipher$AEADGenericBlockCipher))) {
                                        throw new java.security.InvalidAlgorithmParameterException("GCMParameterSpec can only be used with AEAD modes.");
                                    } else {
                                        try {
                                            String v5_14;
                                            org.spongycastle.crypto.params.AEADParameters v9_6 = new Class[0];
                                            String v2_17 = org.spongycastle.jcajce.provider.symmetric.util.BaseBlockCipher.gcmSpecClass.getDeclaredMethod("getTLen", v9_6);
                                            Object[] v10_4 = new Class[0];
                                            reflect.Method v6_43 = org.spongycastle.jcajce.provider.symmetric.util.BaseBlockCipher.gcmSpecClass.getDeclaredMethod("getIV", v10_4);
                                        } catch (Exception) {
                                            throw new java.security.InvalidAlgorithmParameterException("Cannot process GCMParameterSpec.");
                                        }
                                        if (!(v5_2 instanceof org.spongycastle.crypto.params.ParametersWithIV)) {
                                            v5_14 = ((org.spongycastle.crypto.params.KeyParameter) v5_2);
                                        } else {
                                            v5_14 = ((org.spongycastle.crypto.params.KeyParameter) ((org.spongycastle.crypto.params.ParametersWithIV) v5_2).getParameters());
                                        }
                                        Object[] v10_5 = new Object[0];
                                        Object[] v10_6 = new Object[0];
                                        org.spongycastle.crypto.params.AEADParameters v9_10 = new org.spongycastle.crypto.params.AEADParameters(v5_14, ((Integer) v2_17.invoke(p20, v10_5)).intValue(), ((byte[]) ((byte[]) v6_43.invoke(p20, v10_6))));
                                        this.aeadParams = v9_10;
                                        v5_2 = v9_10;
                                    }
                                }
                            } else {
                                v5_2 = new org.spongycastle.crypto.params.RC5Parameters(p19.getEncoded(), ((javax.crypto.spec.RC5ParameterSpec) p20).getRounds());
                                if (!this.baseEngine.getAlgorithmName().startsWith("RC5")) {
                                    throw new java.security.InvalidAlgorithmParameterException("RC5 parameters passed to a cipher that is not RC5.");
                                } else {
                                    if (!this.baseEngine.getAlgorithmName().equals("RC5-32")) {
                                        if ((this.baseEngine.getAlgorithmName().equals("RC5-64")) && (((javax.crypto.spec.RC5ParameterSpec) p20).getWordSize() != 64)) {
                                            String v2_36 = new StringBuilder();
                                            v2_36.append("RC5 already set up for a word size of 64 not ");
                                            v2_36.append(((javax.crypto.spec.RC5ParameterSpec) p20).getWordSize());
                                            v2_36.append(".");
                                            throw new java.security.InvalidAlgorithmParameterException(v2_36.toString());
                                        }
                                    } else {
                                        if (((javax.crypto.spec.RC5ParameterSpec) p20).getWordSize() != 32) {
                                            String v2_40 = new StringBuilder();
                                            v2_40.append("RC5 already set up for a word size of 32 not ");
                                            v2_40.append(((javax.crypto.spec.RC5ParameterSpec) p20).getWordSize());
                                            v2_40.append(".");
                                            throw new java.security.InvalidAlgorithmParameterException(v2_40.toString());
                                        }
                                    }
                                    if ((((javax.crypto.spec.RC5ParameterSpec) p20).getIV() != null) && (this.ivLength != 0)) {
                                        String v2_46;
                                        if (!(v5_2 instanceof org.spongycastle.crypto.params.ParametersWithIV)) {
                                            v2_46 = new org.spongycastle.crypto.params.ParametersWithIV(v5_2, ((javax.crypto.spec.RC5ParameterSpec) p20).getIV());
                                        } else {
                                            v2_46 = new org.spongycastle.crypto.params.ParametersWithIV(((org.spongycastle.crypto.params.ParametersWithIV) v5_2).getParameters(), ((javax.crypto.spec.RC5ParameterSpec) p20).getIV());
                                        }
                                        this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v2_46);
                                        v5_2 = v2_46;
                                    }
                                }
                            }
                        } else {
                            v5_2 = new org.spongycastle.crypto.params.RC2Parameters(p19.getEncoded(), ((javax.crypto.spec.RC2ParameterSpec) p20).getEffectiveKeyBits());
                            if ((((javax.crypto.spec.RC2ParameterSpec) p20).getIV() != null) && (this.ivLength != 0)) {
                                String v2_53;
                                if (!(v5_2 instanceof org.spongycastle.crypto.params.ParametersWithIV)) {
                                    v2_53 = new org.spongycastle.crypto.params.ParametersWithIV(v5_2, ((javax.crypto.spec.RC2ParameterSpec) p20).getIV());
                                } else {
                                    v2_53 = new org.spongycastle.crypto.params.ParametersWithIV(((org.spongycastle.crypto.params.ParametersWithIV) v5_2).getParameters(), ((javax.crypto.spec.RC2ParameterSpec) p20).getIV());
                                }
                                this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v2_53);
                                v5_2 = v2_53;
                            }
                        }
                    } else {
                        v5_2 = new org.spongycastle.crypto.params.ParametersWithSBox(new org.spongycastle.crypto.params.KeyParameter(p19.getEncoded()), ((org.spongycastle.jcajce.spec.GOST28147ParameterSpec) p20).getSbox());
                        if ((((org.spongycastle.jcajce.spec.GOST28147ParameterSpec) p20).getIV() != null) && (this.ivLength != 0)) {
                            String v2_61;
                            if (!(v5_2 instanceof org.spongycastle.crypto.params.ParametersWithIV)) {
                                v2_61 = new org.spongycastle.crypto.params.ParametersWithIV(v5_2, ((org.spongycastle.jcajce.spec.GOST28147ParameterSpec) p20).getIV());
                            } else {
                                v2_61 = new org.spongycastle.crypto.params.ParametersWithIV(((org.spongycastle.crypto.params.ParametersWithIV) v5_2).getParameters(), ((org.spongycastle.jcajce.spec.GOST28147ParameterSpec) p20).getIV());
                            }
                            this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v2_61);
                            v5_2 = v2_61;
                        }
                    }
                } else {
                    if (this.ivLength == 0) {
                        String v2_64 = this.modeName;
                        if ((v2_64 != null) && (v2_64.equals("ECB"))) {
                            throw new java.security.InvalidAlgorithmParameterException("ECB mode does not use an IV");
                        }
                    } else {
                        if ((((javax.crypto.spec.IvParameterSpec) p20).getIV().length != this.ivLength) && ((!(this.cipher instanceof org.spongycastle.jcajce.provider.symmetric.util.BaseBlockCipher$AEADGenericBlockCipher)) && (this.fixedIv))) {
                            String v2_70 = new StringBuilder();
                            v2_70.append("IV must be ");
                            v2_70.append(this.ivLength);
                            v2_70.append(" bytes long.");
                            throw new java.security.InvalidAlgorithmParameterException(v2_70.toString());
                        } else {
                            if (!(v5_2 instanceof org.spongycastle.crypto.params.ParametersWithIV)) {
                                v5_2 = new org.spongycastle.crypto.params.ParametersWithIV(v5_2, ((javax.crypto.spec.IvParameterSpec) p20).getIV());
                            } else {
                                v5_2 = new org.spongycastle.crypto.params.ParametersWithIV(((org.spongycastle.crypto.params.ParametersWithIV) v5_2).getParameters(), ((javax.crypto.spec.IvParameterSpec) p20).getIV());
                            }
                            this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v5_2);
                        }
                    }
                }
                if ((this.ivLength == 0) || (((v5_2 instanceof org.spongycastle.crypto.params.ParametersWithIV)) || ((v5_2 instanceof org.spongycastle.crypto.params.AEADParameters)))) {
                    String v2_86 = v5_2;
                } else {
                    String v2_79;
                    if (p21 != null) {
                        v2_79 = p21;
                    } else {
                        v2_79 = new java.security.SecureRandom();
                    }
                    if ((p18 != 1) && (p18 != 3)) {
                        if (this.cipher.getUnderlyingCipher().getAlgorithmName().indexOf("PGPCFB") < 0) {
                            throw new java.security.InvalidAlgorithmParameterException("no IV set when one expected");
                        }
                    } else {
                        org.spongycastle.crypto.params.ParametersWithIV v3_42 = new byte[this.ivLength];
                        v2_79.nextBytes(v3_42);
                        v2_86 = new org.spongycastle.crypto.params.ParametersWithIV(v5_2, v3_42);
                        this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v2_86);
                    }
                }
                if ((p21 != null) && (this.padded)) {
                    v2_86 = new org.spongycastle.crypto.params.ParametersWithRandom(v2_86, p21);
                }
                try {
                    switch (p18) {
                        case 1:
                        case 3:
                            this.cipher.init(1, v2_86);
                            return;
                        case 2:
                        case 4:
                            this.cipher.init(0, v2_86);
                            return;
                        default:
                            org.spongycastle.crypto.params.ParametersWithIV v3_49 = new StringBuilder();
                            v3_49.append("unknown opmode ");
                            v3_49.append(p18);
                            v3_49.append(" passed");
                            throw new java.security.InvalidParameterException(v3_49.toString());
                    }
                } catch (java.security.InvalidAlgorithmParameterException v0_34) {
                }
                throw new org.spongycastle.jcajce.provider.symmetric.util.BaseBlockCipher$1(this, v0_34.getMessage(), v0_34);
            }
        }
    }

Method org.spongycastle.crypto.signers.ISO9796d2PSSSigner.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p4, org.spongycastle.crypto.CipherParameters p5)
    {
        org.spongycastle.crypto.params.RSAKeyParameters v1_2;
        int v0_0 = this.saltLength;
        if (!(p5 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            if (!(p5 instanceof org.spongycastle.crypto.params.ParametersWithSalt)) {
                v1_2 = ((org.spongycastle.crypto.params.RSAKeyParameters) p5);
                if (p4 != null) {
                    this.random = new java.security.SecureRandom();
                }
            } else {
                v1_2 = ((org.spongycastle.crypto.params.RSAKeyParameters) ((org.spongycastle.crypto.params.ParametersWithSalt) p5).getParameters());
                this.standardSalt = ((org.spongycastle.crypto.params.ParametersWithSalt) p5).getSalt();
                java.security.SecureRandom v5_3 = this.standardSalt;
                v0_0 = v5_3.length;
                if (v5_3.length != this.saltLength) {
                    throw new IllegalArgumentException("Fixed salt is of wrong length");
                }
            }
        } else {
            v1_2 = ((org.spongycastle.crypto.params.RSAKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p5).getParameters());
            if (p4 != null) {
                this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p5).getRandom();
            }
        }
        this.cipher.init(p4, v1_2);
        this.keyBits = v1_2.getModulus().bitLength();
        IllegalArgumentException v4_8 = new byte[((this.keyBits + 7) / 8)];
        this.block = v4_8;
        if (this.trailer != 188) {
            IllegalArgumentException v4_16 = new byte[((((this.block.length - this.digest.getDigestSize()) - v0_0) - 1) - 2)];
            this.mBuf = v4_16;
        } else {
            IllegalArgumentException v4_23 = new byte[((((this.block.length - this.digest.getDigestSize()) - v0_0) - 1) - 1)];
            this.mBuf = v4_23;
        }
        this.reset();
        return;
    }

Method org.spongycastle.crypto.ec.ECNewRandomnessTransform.init() calling method java.security.SecureRandom.<init>()


    public void init(org.spongycastle.crypto.CipherParameters p2)
    {
        if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            if (!(p2 instanceof org.spongycastle.crypto.params.ECPublicKeyParameters)) {
                throw new IllegalArgumentException("ECPublicKeyParameters are required for new randomness transform.");
            } else {
                this.key = ((org.spongycastle.crypto.params.ECPublicKeyParameters) p2);
                this.random = new java.security.SecureRandom();
            }
        } else {
            if (!(((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters() instanceof org.spongycastle.crypto.params.ECPublicKeyParameters)) {
                throw new IllegalArgumentException("ECPublicKeyParameters are required for new randomness transform.");
            } else {
                this.key = ((org.spongycastle.crypto.params.ECPublicKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
                this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
            }
        }
        return;
    }

Method org.spongycastle.cms.jcajce.JceKeyAgreeRecipientInfoGenerator.init() calling method java.security.SecureRandom.<init>()


    private void init(org.spongycastle.asn1.ASN1ObjectIdentifier p4)
    {
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        if ((org.spongycastle.cms.jcajce.CMSUtils.isMQV(p4)) && (this.ephemeralKP == null)) {
            try {
                org.spongycastle.cms.CMSException v0_3 = org.spongycastle.asn1.x509.SubjectPublicKeyInfo.getInstance(this.senderPublicKey.getEncoded());
                String v1_1 = this.helper.createAlgorithmParameters(p4);
                v1_1.init(v0_3.getAlgorithm().getParameters().toASN1Primitive().getEncoded());
                Exception v4_1 = this.helper.createKeyPairGenerator(p4);
                v4_1.initialize(v1_1.getParameterSpec(java.security.spec.AlgorithmParameterSpec), this.random);
                this.ephemeralKP = v4_1.generateKeyPair();
            } catch (Exception v4_3) {
                String v1_4 = new StringBuilder();
                v1_4.append("cannot determine MQV ephemeral key pair parameters from public key: ");
                v1_4.append(v4_3);
                throw new org.spongycastle.cms.CMSException(v1_4.toString(), v4_3);
            }
        }
        return;
    }

Method org.jsoup.helper.HttpConnection$Response.initUnSecureTSL() calling method java.security.SecureRandom.<init>()


    private static declared_synchronized void initUnSecureTSL()
    {
        try {
            if (org.jsoup.helper.HttpConnection$Response.sslSocketFactory == null) {
                java.io.IOException v1_6 = new javax.net.ssl.TrustManager[1];
                v1_6[0] = new org.jsoup.helper.HttpConnection$Response$2();
                String v2_0 = javax.net.ssl.SSLContext.getInstance("SSL");
                v2_0.init(0, v1_6, new java.security.SecureRandom());
                org.jsoup.helper.HttpConnection$Response.sslSocketFactory = v2_0.getSocketFactory();
            }
        } catch (java.io.IOException v1_4) {
            throw v1_4;
        }
        return;
    }

Method org.spongycastle.openpgp.operator.jcajce.JcePGPDataEncryptorBuilder.getSecureRandom() calling method java.security.SecureRandom.<init>()


    public java.security.SecureRandom getSecureRandom()
    {
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        return this.random;
    }

Method org.spongycastle.openpgp.operator.bc.BcPGPDataEncryptorBuilder.getSecureRandom() calling method java.security.SecureRandom.<init>()


    public java.security.SecureRandom getSecureRandom()
    {
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        return this.random;
    }

Method org.spongycastle.openpgp.operator.bc.BcPBESecretKeyEncryptorBuilder$1.encryptKeyData() calling method java.security.SecureRandom.<init>()


    public byte[] encryptKeyData(byte[] p9, byte[] p10, byte[] p11, int p12, int p13)
    {
        try {
            org.spongycastle.crypto.BlockCipher v0_1 = org.spongycastle.openpgp.operator.bc.BcImplProvider.createBlockCipher(this.encAlgorithm);
        } catch (org.spongycastle.crypto.BufferedBlockCipher v9_1) {
            int v11_2 = new StringBuilder();
            v11_2.append("decryption failed: ");
            v11_2.append(v9_1.getMessage());
            throw new org.spongycastle.openpgp.PGPException(v11_2.toString(), v9_1);
        }
        if (p10 == null) {
            if (this.random == null) {
                this.random = new java.security.SecureRandom();
            }
            p10 = new byte[v0_1.getBlockSize()];
            this.iv = p10;
            this.random.nextBytes(p10);
        } else {
            this.iv = p10;
        }
        org.spongycastle.crypto.BufferedBlockCipher v9_2 = org.spongycastle.openpgp.operator.bc.BcUtil.createSymmetricKeyWrapper(1, v0_1, p9, p10);
        byte[] v10_4 = new byte[p13];
        v9_2.doFinal(v10_4, v9_2.processBytes(p11, p12, p13, v10_4, 0));
        return v10_4;
    }

Method org.spongycastle.openpgp.operator.PBEKeyEncryptionMethodGenerator.getKey() calling method java.security.SecureRandom.<init>()


    public byte[] getKey(int p5)
    {
        if (this.s2k == null) {
            org.spongycastle.openpgp.operator.PGPDigestCalculator v0_3 = new byte[8];
            if (this.random == null) {
                this.random = new java.security.SecureRandom();
            }
            this.random.nextBytes(v0_3);
            this.s2k = new org.spongycastle.bcpg.S2K(this.s2kDigestCalculator.getAlgorithm(), v0_3, this.s2kCount);
        }
        return org.spongycastle.openpgp.operator.PGPUtil.makeKeyFromPassPhrase(this.s2kDigestCalculator, p5, this.s2k, this.passPhrase);
    }

Method org.spongycastle.jce.provider.BrokenJCEBlockCipher.engineInit() calling method java.security.SecureRandom.<init>()


    protected void engineInit(int p9, java.security.Key p10, java.security.spec.AlgorithmParameterSpec p11, java.security.SecureRandom p12)
    {
        org.spongycastle.crypto.params.ParametersWithIV v10_5;
        if (!(p10 instanceof org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey)) {
            if (p11 != null) {
                if (!(p11 instanceof javax.crypto.spec.IvParameterSpec)) {
                    if (!(p11 instanceof javax.crypto.spec.RC2ParameterSpec)) {
                        if (!(p11 instanceof javax.crypto.spec.RC5ParameterSpec)) {
                            throw new java.security.InvalidAlgorithmParameterException("unknown parameter type.");
                        } else {
                            org.spongycastle.crypto.params.RC5Parameters v0_3 = new org.spongycastle.crypto.params.RC5Parameters(p10.getEncoded(), ((javax.crypto.spec.RC5ParameterSpec) p11).getRounds());
                            if (((javax.crypto.spec.RC5ParameterSpec) p11).getWordSize() != 32) {
                                throw new IllegalArgumentException("can only accept RC5 word size 32 (at the moment...)");
                            } else {
                                if ((((javax.crypto.spec.RC5ParameterSpec) p11).getIV() == null) || (this.ivLength == 0)) {
                                    v10_5 = v0_3;
                                } else {
                                    v10_5 = new org.spongycastle.crypto.params.ParametersWithIV(v0_3, ((javax.crypto.spec.RC5ParameterSpec) p11).getIV());
                                    this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v10_5);
                                }
                            }
                        }
                    } else {
                        org.spongycastle.crypto.params.RC5Parameters v0_6 = new org.spongycastle.crypto.params.RC2Parameters(p10.getEncoded(), ((javax.crypto.spec.RC2ParameterSpec) p11).getEffectiveKeyBits());
                        if ((((javax.crypto.spec.RC2ParameterSpec) p11).getIV() == null) || (this.ivLength == 0)) {
                            v10_5 = v0_6;
                        } else {
                            v10_5 = new org.spongycastle.crypto.params.ParametersWithIV(v0_6, ((javax.crypto.spec.RC2ParameterSpec) p11).getIV());
                            this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v10_5);
                        }
                    }
                } else {
                    if (this.ivLength == 0) {
                        v10_5 = new org.spongycastle.crypto.params.KeyParameter(p10.getEncoded());
                    } else {
                        org.spongycastle.crypto.params.RC5Parameters v0_11 = new org.spongycastle.crypto.params.ParametersWithIV(new org.spongycastle.crypto.params.KeyParameter(p10.getEncoded()), ((javax.crypto.spec.IvParameterSpec) p11).getIV());
                        this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v0_11);
                        v10_5 = v0_11;
                    }
                }
            } else {
                v10_5 = new org.spongycastle.crypto.params.KeyParameter(p10.getEncoded());
            }
        } else {
            v10_5 = org.spongycastle.jce.provider.BrokenPBE$Util.makePBEParameters(((org.spongycastle.jcajce.provider.symmetric.util.BCPBEKey) p10), p11, this.pbeType, this.pbeHash, this.cipher.getUnderlyingCipher().getAlgorithmName(), this.pbeKeySize, this.pbeIvSize);
            if (this.pbeIvSize != 0) {
                this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v10_5);
            }
        }
        if ((this.ivLength != 0) && (!(v10_5 instanceof org.spongycastle.crypto.params.ParametersWithIV))) {
            if (p12 == null) {
                p12 = new java.security.SecureRandom();
            }
            if ((p9 != 1) && (p9 != 3)) {
                throw new java.security.InvalidAlgorithmParameterException("no IV set when one expected");
            } else {
                org.spongycastle.crypto.params.ParametersWithIV v11_8 = new byte[this.ivLength];
                p12.nextBytes(v11_8);
                org.spongycastle.crypto.params.ParametersWithIV v12_3 = new org.spongycastle.crypto.params.ParametersWithIV(v10_5, v11_8);
                this.ivParam = ((org.spongycastle.crypto.params.ParametersWithIV) v12_3);
                v10_5 = v12_3;
            }
        }
        switch (p9) {
            case 1:
            case 3:
                this.cipher.init(1, v10_5);
                break;
            case 2:
            case 4:
                this.cipher.init(0, v10_5);
                break;
            default:
                System.out.println("eeek!");
        }
        return;
    }

Method org.spongycastle.jcajce.provider.symmetric.Shacal2$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[32];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("Shacal2");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.SM4$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[16];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("SM4");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.SEED$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[16];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("SEED");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.RC6$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[16];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("RC6");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.RC5$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[8];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("RC5");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.RC2$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        RuntimeException v1_6;
        if (this.spec != null) {
            try {
                v1_6 = this.createParametersInstance("RC2");
                v1_6.init(this.spec);
            } catch (String v0_8) {
                throw new RuntimeException(v0_8.getMessage());
            }
        } else {
            String v0_3 = new byte[8];
            if (this.random == null) {
                this.random = new java.security.SecureRandom();
            }
            this.random.nextBytes(v0_3);
            try {
                v1_6 = this.createParametersInstance("RC2");
                v1_6.init(new javax.crypto.spec.IvParameterSpec(v0_3));
            } catch (String v0_5) {
                throw new RuntimeException(v0_5.getMessage());
            }
        }
        return v1_6;
    }

Method org.spongycastle.jcajce.provider.symmetric.Noekeon$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[16];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("Noekeon");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.IDEA$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[8];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("IDEA");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.GOST28147$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[16];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("GOST28147");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.DESede$KeyGenerator.engineGenerateKey() calling method java.security.SecureRandom.<init>()


    protected javax.crypto.SecretKey engineGenerateKey()
    {
        if (this.uninitialised) {
            this.engine.init(new org.spongycastle.crypto.KeyGenerationParameters(new java.security.SecureRandom(), this.defaultKeySize));
            this.uninitialised = 0;
        }
        if (this.keySizeSet) {
            return new javax.crypto.spec.SecretKeySpec(this.engine.generateKey(), this.algName);
        } else {
            javax.crypto.spec.SecretKeySpec v0_5 = this.engine.generateKey();
            System.arraycopy(v0_5, 0, v0_5, 16, 8);
            return new javax.crypto.spec.SecretKeySpec(v0_5, this.algName);
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.DESede$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[8];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("DES");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.DES$KeyGenerator.engineGenerateKey() calling method java.security.SecureRandom.<init>()


    protected javax.crypto.SecretKey engineGenerateKey()
    {
        if (this.uninitialised) {
            this.engine.init(new org.spongycastle.crypto.KeyGenerationParameters(new java.security.SecureRandom(), this.defaultKeySize));
            this.uninitialised = 0;
        }
        return new javax.crypto.spec.SecretKeySpec(this.engine.generateKey(), this.algName);
    }

Method org.spongycastle.jcajce.provider.symmetric.DES$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[8];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("DES");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.Camellia$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[16];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("Camellia");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.CAST5$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[8];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("CAST5");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.AES$AlgParamGenGCM.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        RuntimeException v1_0 = new byte[12];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v1_0);
        try {
            java.security.AlgorithmParameters v2_0 = this.createParametersInstance("GCM");
            v2_0.init(new org.spongycastle.asn1.cms.GCMParameters(v1_0, 12).getEncoded());
            return v2_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.AES$AlgParamGenCCM.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        RuntimeException v1_0 = new byte[12];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v1_0);
        try {
            java.security.AlgorithmParameters v2_0 = this.createParametersInstance("CCM");
            v2_0.init(new org.spongycastle.asn1.cms.CCMParameters(v1_0, 12).getEncoded());
            return v2_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.symmetric.AES$AlgParamGen.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new byte[16];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        try {
            RuntimeException v1_0 = this.createParametersInstance("AES");
            v1_0.init(new javax.crypto.spec.IvParameterSpec(v0_1));
            return v1_0;
        } catch (String v0_2) {
            throw new RuntimeException(v0_2.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi.<init>() calling method java.security.SecureRandom.<init>()


    public PKCS12KeyStoreSpi(java.security.Provider p3, org.spongycastle.asn1.ASN1ObjectIdentifier p4, org.spongycastle.asn1.ASN1ObjectIdentifier p5)
    {
        this.helper = new org.spongycastle.jcajce.util.BCJcaJceHelper();
        this.keys = new org.spongycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi$IgnoresCaseHashtable(0);
        this.localIds = new java.util.Hashtable();
        this.certs = new org.spongycastle.jcajce.provider.keystore.pkcs12.PKCS12KeyStoreSpi$IgnoresCaseHashtable(0);
        this.chainCerts = new java.util.Hashtable();
        this.keyCerts = new java.util.Hashtable();
        this.random = new java.security.SecureRandom();
        this.keyAlgorithm = p4;
        this.certAlgorithm = p5;
        try {
            if (p3 == null) {
                this.certFact = java.security.cert.CertificateFactory.getInstance("X.509");
            } else {
                this.certFact = java.security.cert.CertificateFactory.getInstance("X.509", p3);
            }
        } catch (String v3_4) {
            StringBuilder v5_2 = new StringBuilder();
            v5_2.append("can\'t create cert factory - ");
            v5_2.append(v3_4.toString());
            throw new IllegalArgumentException(v5_2.toString());
        }
        return;
    }

Method org.spongycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi.<init>() calling method java.security.SecureRandom.<init>()


    public BcKeyStoreSpi(int p2)
    {
        this.table = new java.util.Hashtable();
        this.random = new java.security.SecureRandom();
        this.helper = new org.spongycastle.jcajce.util.BCJcaJceHelper();
        this.version = p2;
        return;
    }

Method org.spongycastle.jcajce.provider.asymmetric.rsa.CipherSpi.engineInit() calling method java.security.SecureRandom.<init>()


    protected void engineInit(int p6, java.security.Key p7, java.security.spec.AlgorithmParameterSpec p8, java.security.SecureRandom p9)
    {
        if ((p8 != null) && (!(p8 instanceof javax.crypto.spec.OAEPParameterSpec))) {
            String v7_16 = new StringBuilder();
            v7_16.append("unknown parameter type: ");
            v7_16.append(p8.getClass().getName());
            throw new java.security.InvalidAlgorithmParameterException(v7_16.toString());
        } else {
            String v7_12;
            if (!(p7 instanceof java.security.interfaces.RSAPublicKey)) {
                if (!(p7 instanceof java.security.interfaces.RSAPrivateKey)) {
                    throw new java.security.InvalidKeyException("unknown key type passed to RSA");
                } else {
                    if ((this.publicKeyOnly) && (p6 == 1)) {
                        throw new java.security.InvalidKeyException("mode 2 requires RSAPublicKey");
                    } else {
                        v7_12 = org.spongycastle.jcajce.provider.asymmetric.rsa.RSAUtil.generatePrivateKeyParameter(((java.security.interfaces.RSAPrivateKey) p7));
                    }
                }
            } else {
                if ((this.privateKeyOnly) && (p6 == 1)) {
                    throw new java.security.InvalidKeyException("mode 1 requires RSAPrivateKey");
                } else {
                    v7_12 = org.spongycastle.jcajce.provider.asymmetric.rsa.RSAUtil.generatePublicKeyParameter(((java.security.interfaces.RSAPublicKey) p7));
                }
            }
            if (p8 != null) {
                this.paramSpec = p8;
                if ((!((javax.crypto.spec.OAEPParameterSpec) p8).getMGFAlgorithm().equalsIgnoreCase("MGF1")) && (!((javax.crypto.spec.OAEPParameterSpec) p8).getMGFAlgorithm().equals(org.spongycastle.asn1.pkcs.PKCSObjectIdentifiers.id_mgf1.getId()))) {
                    throw new java.security.InvalidAlgorithmParameterException("unknown mask generation function specified");
                } else {
                    if (!(((javax.crypto.spec.OAEPParameterSpec) p8).getMGFParameters() instanceof java.security.spec.MGF1ParameterSpec)) {
                        throw new java.security.InvalidAlgorithmParameterException("unkown MGF parameters");
                    } else {
                        String v8_18 = org.spongycastle.jcajce.provider.util.DigestFactory.getDigest(((javax.crypto.spec.OAEPParameterSpec) p8).getDigestAlgorithm());
                        if (v8_18 == null) {
                            String v7_20 = new StringBuilder();
                            v7_20.append("no match on digest algorithm: ");
                            v7_20.append(((javax.crypto.spec.OAEPParameterSpec) p8).getDigestAlgorithm());
                            throw new java.security.InvalidAlgorithmParameterException(v7_20.toString());
                        } else {
                            org.spongycastle.crypto.encodings.OAEPEncoding v2_6 = ((java.security.spec.MGF1ParameterSpec) ((javax.crypto.spec.OAEPParameterSpec) p8).getMGFParameters());
                            org.spongycastle.crypto.Digest v3_1 = org.spongycastle.jcajce.provider.util.DigestFactory.getDigest(v2_6.getDigestAlgorithm());
                            if (v3_1 == null) {
                                String v7_2 = new StringBuilder();
                                v7_2.append("no match on MGF digest algorithm: ");
                                v7_2.append(v2_6.getDigestAlgorithm());
                                throw new java.security.InvalidAlgorithmParameterException(v7_2.toString());
                            } else {
                                this.cipher = new org.spongycastle.crypto.encodings.OAEPEncoding(new org.spongycastle.crypto.engines.RSABlindedEngine(), v8_18, v3_1, ((javax.crypto.spec.PSource$PSpecified) ((javax.crypto.spec.OAEPParameterSpec) p8).getPSource()).getValue());
                            }
                        }
                    }
                }
            }
            String v8_6;
            if ((this.cipher instanceof org.spongycastle.crypto.engines.RSABlindedEngine)) {
                v8_6 = v7_12;
            } else {
                if (p9 == null) {
                    v8_6 = new org.spongycastle.crypto.params.ParametersWithRandom(v7_12, new java.security.SecureRandom());
                } else {
                    v8_6 = new org.spongycastle.crypto.params.ParametersWithRandom(v7_12, p9);
                }
            }
            this.bOut.reset();
            switch (p6) {
                case 1:
                case 3:
                    this.cipher.init(1, v8_6);
                    break;
                case 2:
                case 4:
                    this.cipher.init(0, v8_6);
                    break;
                default:
                    String v8_10 = new StringBuilder();
                    v8_10.append("unknown opmode ");
                    v8_10.append(p6);
                    v8_10.append(" passed to RSA");
                    throw new java.security.InvalidParameterException(v8_10.toString());
            }
            return;
        }
    }

Method org.spongycastle.jcajce.provider.asymmetric.gost.AlgorithmParameterGeneratorSpi.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new org.spongycastle.crypto.generators.GOST3410ParametersGenerator();
        RuntimeException v1_2 = this.random;
        if (v1_2 == null) {
            v0_1.init(this.strength, 2, new java.security.SecureRandom());
        } else {
            v0_1.init(this.strength, 2, v1_2);
        }
        String v0_2 = v0_1.generateParameters();
        try {
            RuntimeException v1_1 = this.createParametersInstance("GOST3410");
            v1_1.init(new org.spongycastle.jce.spec.GOST3410ParameterSpec(new org.spongycastle.jce.spec.GOST3410PublicKeyParameterSetSpec(v0_2.getP(), v0_2.getQ(), v0_2.getA())));
            return v1_1;
        } catch (String v0_4) {
            throw new RuntimeException(v0_4.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.asymmetric.elgamal.AlgorithmParameterGeneratorSpi.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new org.spongycastle.crypto.generators.ElGamalParametersGenerator();
        RuntimeException v1_2 = this.random;
        if (v1_2 == null) {
            v0_1.init(this.strength, 20, new java.security.SecureRandom());
        } else {
            v0_1.init(this.strength, 20, v1_2);
        }
        String v0_2 = v0_1.generateParameters();
        try {
            RuntimeException v1_1 = this.createParametersInstance("ElGamal");
            v1_1.init(new javax.crypto.spec.DHParameterSpec(v0_2.getP(), v0_2.getG(), this.l));
            return v1_1;
        } catch (String v0_4) {
            throw new RuntimeException(v0_4.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.asymmetric.ec.KeyPairGeneratorSpi$EC.generateKeyPair() calling method java.security.SecureRandom.<init>()


    public java.security.KeyPair generateKeyPair()
    {
        if (!this.initialised) {
            this.initialize(this.strength, new java.security.SecureRandom());
        }
        org.spongycastle.jcajce.provider.asymmetric.ec.BCECPublicKey v0_11 = this.engine.generateKeyPair();
        java.security.KeyPair v1_1 = ((org.spongycastle.crypto.params.ECPublicKeyParameters) v0_11.getPublic());
        org.spongycastle.crypto.params.ECPrivateKeyParameters v4_1 = ((org.spongycastle.crypto.params.ECPrivateKeyParameters) v0_11.getPrivate());
        org.spongycastle.jcajce.provider.asymmetric.ec.BCECPublicKey v0_2 = this.ecParams;
        if (!(v0_2 instanceof org.spongycastle.jce.spec.ECParameterSpec)) {
            if (v0_2 != null) {
                java.security.spec.ECParameterSpec v6_1 = ((java.security.spec.ECParameterSpec) v0_2);
                org.spongycastle.jcajce.provider.asymmetric.ec.BCECPublicKey v0_5 = new org.spongycastle.jcajce.provider.asymmetric.ec.BCECPublicKey(this.algorithm, v1_1, v6_1, this.configuration);
                org.spongycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey v8_0 = new org.spongycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey;
                v8_0(this.algorithm, v4_1, v0_5, v6_1, this.configuration);
                return new java.security.KeyPair(v0_5, v8_0);
            } else {
                return new java.security.KeyPair(new org.spongycastle.jcajce.provider.asymmetric.ec.BCECPublicKey(this.algorithm, v1_1, this.configuration), new org.spongycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey(this.algorithm, v4_1, this.configuration));
            }
        } else {
            java.security.spec.ECParameterSpec v6_3 = ((org.spongycastle.jce.spec.ECParameterSpec) v0_2);
            org.spongycastle.jcajce.provider.asymmetric.ec.BCECPublicKey v0_9 = new org.spongycastle.jcajce.provider.asymmetric.ec.BCECPublicKey(this.algorithm, v1_1, v6_3, this.configuration);
            org.spongycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey v8_1 = new org.spongycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey;
            v8_1(this.algorithm, v4_1, v0_9, v6_3, this.configuration);
            return new java.security.KeyPair(v0_9, v8_1);
        }
    }

Method org.spongycastle.jcajce.provider.asymmetric.ec.KeyPairGeneratorSpi$EC.<init>() calling method java.security.SecureRandom.<init>()


    public KeyPairGeneratorSpi$EC(String p2, org.spongycastle.jcajce.provider.config.ProviderConfiguration p3)
    {
        super(p2);
        super.engine = new org.spongycastle.crypto.generators.ECKeyPairGenerator();
        super.ecParams = 0;
        super.strength = 239;
        super.certainty = 50;
        super.random = new java.security.SecureRandom();
        super.initialised = 0;
        super.algorithm = p2;
        super.configuration = p3;
        return;
    }

Method org.spongycastle.jcajce.provider.asymmetric.ec.KeyPairGeneratorSpi$EC.<init>() calling method java.security.SecureRandom.<init>()


    public KeyPairGeneratorSpi$EC()
    {
        super("EC");
        super.engine = new org.spongycastle.crypto.generators.ECKeyPairGenerator();
        super.ecParams = 0;
        super.strength = 239;
        super.certainty = 50;
        super.random = new java.security.SecureRandom();
        super.initialised = 0;
        super.algorithm = "EC";
        super.configuration = org.spongycastle.jce.provider.BouncyCastleProvider.CONFIGURATION;
        return;
    }

Method org.spongycastle.jcajce.provider.asymmetric.dsa.AlgorithmParameterGeneratorSpi.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_6;
        if (this.strength > 1024) {
            v0_6 = new org.spongycastle.crypto.generators.DSAParametersGenerator(new org.spongycastle.crypto.digests.SHA256Digest());
        } else {
            v0_6 = new org.spongycastle.crypto.generators.DSAParametersGenerator();
        }
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        java.security.spec.DSAParameterSpec v2_2 = this.strength;
        if (v2_2 != 1024) {
            if (v2_2 <= 1024) {
                v0_6.init(v2_2, 20, this.random);
            } else {
                this.params = new org.spongycastle.crypto.params.DSAParameterGenerationParameters(v2_2, 256, 80, this.random);
                v0_6.init(this.params);
            }
        } else {
            this.params = new org.spongycastle.crypto.params.DSAParameterGenerationParameters(1024, 160, 80, this.random);
            v0_6.init(this.params);
        }
        String v0_2 = v0_6.generateParameters();
        try {
            RuntimeException v1_7 = this.createParametersInstance("DSA");
            v1_7.init(new java.security.spec.DSAParameterSpec(v0_2.getP(), v0_2.getQ(), v0_2.getG()));
            return v1_7;
        } catch (String v0_4) {
            throw new RuntimeException(v0_4.getMessage());
        }
    }

Method org.spongycastle.jcajce.provider.asymmetric.dh.AlgorithmParameterGeneratorSpi.engineGenerateParameters() calling method java.security.SecureRandom.<init>()


    protected java.security.AlgorithmParameters engineGenerateParameters()
    {
        String v0_1 = new org.spongycastle.crypto.generators.DHParametersGenerator();
        RuntimeException v1_2 = this.random;
        if (v1_2 == null) {
            v0_1.init(this.strength, 20, new java.security.SecureRandom());
        } else {
            v0_1.init(this.strength, 20, v1_2);
        }
        String v0_2 = v0_1.generateParameters();
        try {
            RuntimeException v1_1 = this.createParametersInstance("DH");
            v1_1.init(new javax.crypto.spec.DHParameterSpec(v0_2.getP(), v0_2.getG(), this.l));
            return v1_1;
        } catch (String v0_4) {
            throw new RuntimeException(v0_4.getMessage());
        }
    }

Method org.spongycastle.crypto.signers.SM2Signer.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p2, org.spongycastle.crypto.CipherParameters p3)
    {
        if (!(p3 instanceof org.spongycastle.crypto.params.ParametersWithID)) {
            java.security.SecureRandom v0_2 = new byte[0];
            this.userID = v0_2;
        } else {
            java.security.SecureRandom v0_7 = ((org.spongycastle.crypto.params.ParametersWithID) p3).getParameters();
            this.userID = ((org.spongycastle.crypto.params.ParametersWithID) p3).getID();
            p3 = v0_7;
        }
        if (p2 == null) {
            this.ecKey = ((org.spongycastle.crypto.params.ECKeyParameters) p3);
            this.ecParams = this.ecKey.getParameters();
            this.pubPoint = ((org.spongycastle.crypto.params.ECPublicKeyParameters) this.ecKey).getQ();
        } else {
            if (!(p3 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.ecKey = ((org.spongycastle.crypto.params.ECKeyParameters) p3);
                this.ecParams = this.ecKey.getParameters();
                this.kCalculator.init(this.ecParams.getN(), new java.security.SecureRandom());
            } else {
                this.ecKey = ((org.spongycastle.crypto.params.ECKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p3).getParameters());
                this.ecParams = this.ecKey.getParameters();
                this.kCalculator.init(this.ecParams.getN(), ((org.spongycastle.crypto.params.ParametersWithRandom) p3).getRandom());
            }
            this.pubPoint = this.ecParams.getG().multiply(((org.spongycastle.crypto.params.ECPrivateKeyParameters) this.ecKey).getD()).normalize();
        }
        this.curveLength = ((this.ecParams.getCurve().getFieldSize() + 7) / 8);
        return;
    }

Method org.spongycastle.crypto.signers.PSSSigner.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p3, org.spongycastle.crypto.CipherParameters p4)
    {
        org.spongycastle.crypto.AsymmetricBlockCipher v1_0;
        if (!(p4 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            if (p3 != null) {
                this.random = new java.security.SecureRandom();
            }
            v1_0 = p4;
        } else {
            v1_0 = ((org.spongycastle.crypto.params.ParametersWithRandom) p4).getParameters();
            this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p4).getRandom();
        }
        int v0_4;
        if (!(v1_0 instanceof org.spongycastle.crypto.params.RSABlindingParameters)) {
            v0_4 = ((org.spongycastle.crypto.params.RSAKeyParameters) v1_0);
            this.cipher.init(p3, v1_0);
        } else {
            v0_4 = ((org.spongycastle.crypto.params.RSABlindingParameters) v1_0).getPublicKey();
            this.cipher.init(p3, p4);
        }
        this.emBits = (v0_4.getModulus().bitLength() - 1);
        IllegalArgumentException v3_4 = this.emBits;
        if (v3_4 < (((this.hLen * 8) + (this.sLen * 8)) + 9)) {
            throw new IllegalArgumentException("key too small for specified hash and salt lengths");
        } else {
            IllegalArgumentException v3_9 = new byte[((v3_4 + 7) / 8)];
            this.block = v3_9;
            this.reset();
            return;
        }
    }

Method org.spongycastle.crypto.signers.GOST3410Signer.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p1, org.spongycastle.crypto.CipherParameters p2)
    {
        if (p1 == null) {
            this.key = ((org.spongycastle.crypto.params.GOST3410PublicKeyParameters) p2);
        } else {
            if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.random = new java.security.SecureRandom();
                this.key = ((org.spongycastle.crypto.params.GOST3410PrivateKeyParameters) p2);
            } else {
                this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
                this.key = ((org.spongycastle.crypto.params.GOST3410PrivateKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
            }
        }
        return;
    }

Method org.spongycastle.crypto.signers.ECNRSigner.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p1, org.spongycastle.crypto.CipherParameters p2)
    {
        this.forSigning = p1;
        if (p1 == null) {
            this.key = ((org.spongycastle.crypto.params.ECPublicKeyParameters) p2);
        } else {
            if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.random = new java.security.SecureRandom();
                this.key = ((org.spongycastle.crypto.params.ECPrivateKeyParameters) p2);
            } else {
                this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
                this.key = ((org.spongycastle.crypto.params.ECPrivateKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
            }
        }
        return;
    }

Method org.spongycastle.crypto.signers.ECGOST3410_2012Signer.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p1, org.spongycastle.crypto.CipherParameters p2)
    {
        if (p1 == null) {
            this.key = ((org.spongycastle.crypto.params.ECPublicKeyParameters) p2);
        } else {
            if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.random = new java.security.SecureRandom();
                this.key = ((org.spongycastle.crypto.params.ECPrivateKeyParameters) p2);
            } else {
                this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
                this.key = ((org.spongycastle.crypto.params.ECPrivateKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
            }
        }
        return;
    }

Method org.spongycastle.crypto.signers.ECGOST3410Signer.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p1, org.spongycastle.crypto.CipherParameters p2)
    {
        if (p1 == null) {
            this.key = ((org.spongycastle.crypto.params.ECPublicKeyParameters) p2);
        } else {
            if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.random = new java.security.SecureRandom();
                this.key = ((org.spongycastle.crypto.params.ECPrivateKeyParameters) p2);
            } else {
                this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
                this.key = ((org.spongycastle.crypto.params.ECPrivateKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
            }
        }
        return;
    }

Method org.spongycastle.crypto.signers.ECDSASigner.initSecureRandom() calling method java.security.SecureRandom.<init>()


    protected java.security.SecureRandom initSecureRandom(boolean p1, java.security.SecureRandom p2)
    {
        if (p1) {
            if (p2 == null) {
                p2 = new java.security.SecureRandom();
            }
        } else {
            p2 = 0;
        }
        return p2;
    }

Method org.spongycastle.crypto.signers.DSTU4145Signer.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p1, org.spongycastle.crypto.CipherParameters p2)
    {
        if (p1 == null) {
            this.key = ((org.spongycastle.crypto.params.ECPublicKeyParameters) p2);
        } else {
            if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
                this.random = new java.security.SecureRandom();
            } else {
                this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
                p2 = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters();
            }
            this.key = ((org.spongycastle.crypto.params.ECPrivateKeyParameters) p2);
        }
        return;
    }

Method org.spongycastle.crypto.signers.DSASigner.initSecureRandom() calling method java.security.SecureRandom.<init>()


    protected java.security.SecureRandom initSecureRandom(boolean p1, java.security.SecureRandom p2)
    {
        if (p1) {
            if (p2 == null) {
                p2 = new java.security.SecureRandom();
            }
        } else {
            p2 = 0;
        }
        return p2;
    }

Method org.spongycastle.crypto.signers.DSASigner.getRandomizer() calling method java.security.SecureRandom.<init>()


    private java.math.BigInteger getRandomizer(java.math.BigInteger p4, java.security.SecureRandom p5)
    {
        if (p5 == null) {
            p5 = new java.security.SecureRandom();
        }
        return new java.math.BigInteger(7, p5).add(java.math.BigInteger.valueOf(128)).multiply(p4);
    }

Method org.spongycastle.crypto.params.ParametersWithRandom.<init>() calling method java.security.SecureRandom.<init>()


    public ParametersWithRandom(org.spongycastle.crypto.CipherParameters p2)
    {
        this(p2, new java.security.SecureRandom());
        return;
    }

Method org.spongycastle.crypto.paddings.ISO10126d2Padding.init() calling method java.security.SecureRandom.<init>()


    public void init(java.security.SecureRandom p1)
    {
        if (p1 == null) {
            this.random = new java.security.SecureRandom();
        } else {
            this.random = p1;
        }
        return;
    }

Method org.spongycastle.crypto.generators.ECKeyPairGenerator.init() calling method java.security.SecureRandom.<init>()


    public void init(org.spongycastle.crypto.KeyGenerationParameters p2)
    {
        this.random = ((org.spongycastle.crypto.params.ECKeyGenerationParameters) p2).getRandom();
        this.params = ((org.spongycastle.crypto.params.ECKeyGenerationParameters) p2).getDomainParameters();
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        return;
    }

Method org.spongycastle.crypto.engines.RSABlindedEngine.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p2, org.spongycastle.crypto.CipherParameters p3)
    {
        this.core.init(p2, p3);
        if (!(p3 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            this.key = ((org.spongycastle.crypto.params.RSAKeyParameters) p3);
            this.random = new java.security.SecureRandom();
        } else {
            this.key = ((org.spongycastle.crypto.params.RSAKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p3).getParameters());
            this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p3).getRandom();
        }
        return;
    }

Method org.spongycastle.crypto.engines.RFC3211WrapEngine.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p2, org.spongycastle.crypto.CipherParameters p3)
    {
        this.forWrapping = p2;
        if (!(p3 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            if (p2 != null) {
                this.rand = new java.security.SecureRandom();
            }
            this.param = ((org.spongycastle.crypto.params.ParametersWithIV) p3);
        } else {
            this.rand = ((org.spongycastle.crypto.params.ParametersWithRandom) p3).getRandom();
            this.param = ((org.spongycastle.crypto.params.ParametersWithIV) ((org.spongycastle.crypto.params.ParametersWithRandom) p3).getParameters());
        }
        return;
    }

Method org.spongycastle.crypto.engines.RC2WrapEngine.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p2, org.spongycastle.crypto.CipherParameters p3)
    {
        this.forWrapping = p2;
        this.engine = new org.spongycastle.crypto.modes.CBCBlockCipher(new org.spongycastle.crypto.engines.RC2Engine());
        if (!(p3 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            this.sr = new java.security.SecureRandom();
        } else {
            this.sr = ((org.spongycastle.crypto.params.ParametersWithRandom) p3).getRandom();
            p3 = ((org.spongycastle.crypto.params.ParametersWithRandom) p3).getParameters();
        }
        if (!(p3 instanceof org.spongycastle.crypto.params.ParametersWithIV)) {
            this.param = p3;
            if (this.forWrapping) {
                IllegalArgumentException v2_5 = new byte[8];
                this.iv = v2_5;
                this.sr.nextBytes(this.iv);
                this.paramPlusIV = new org.spongycastle.crypto.params.ParametersWithIV(this.param, this.iv);
            }
        } else {
            this.paramPlusIV = ((org.spongycastle.crypto.params.ParametersWithIV) p3);
            this.iv = this.paramPlusIV.getIV();
            this.param = this.paramPlusIV.getParameters();
            if (!this.forWrapping) {
                throw new IllegalArgumentException("You should not supply an IV for unwrapping");
            } else {
                IllegalArgumentException v2_17 = this.iv;
                if ((v2_17 == null) || (v2_17.length != 8)) {
                    throw new IllegalArgumentException("IV is not 8 octets");
                }
            }
        }
        return;
    }

Method org.spongycastle.crypto.engines.ElGamalEngine.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p2, org.spongycastle.crypto.CipherParameters p3)
    {
        if (!(p3 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            this.key = ((org.spongycastle.crypto.params.ElGamalKeyParameters) p3);
            this.random = new java.security.SecureRandom();
        } else {
            this.key = ((org.spongycastle.crypto.params.ElGamalKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p3).getParameters());
            this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p3).getRandom();
        }
        this.forEncryption = p2;
        this.bitSize = this.key.getParameters().getP().bitLength();
        if (p2 == null) {
            if (!(this.key instanceof org.spongycastle.crypto.params.ElGamalPrivateKeyParameters)) {
                throw new IllegalArgumentException("ElGamalPrivateKeyParameters are required for decryption.");
            }
        } else {
            if (!(this.key instanceof org.spongycastle.crypto.params.ElGamalPublicKeyParameters)) {
                throw new IllegalArgumentException("ElGamalPublicKeyParameters are required for encryption.");
            }
        }
        return;
    }

Method org.spongycastle.crypto.engines.DESedeWrapEngine.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p4, org.spongycastle.crypto.CipherParameters p5)
    {
        String v5_1;
        IllegalArgumentException v4_2;
        this.forWrapping = p4;
        this.engine = new org.spongycastle.crypto.modes.CBCBlockCipher(new org.spongycastle.crypto.engines.DESedeEngine());
        if (!(p5 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            v5_1 = new java.security.SecureRandom();
            v4_2 = p5;
        } else {
            v4_2 = ((org.spongycastle.crypto.params.ParametersWithRandom) p5).getParameters();
            v5_1 = ((org.spongycastle.crypto.params.ParametersWithRandom) p5).getRandom();
        }
        if (!(v4_2 instanceof org.spongycastle.crypto.params.KeyParameter)) {
            if ((v4_2 instanceof org.spongycastle.crypto.params.ParametersWithIV)) {
                this.paramPlusIV = ((org.spongycastle.crypto.params.ParametersWithIV) v4_2);
                this.iv = this.paramPlusIV.getIV();
                this.param = ((org.spongycastle.crypto.params.KeyParameter) this.paramPlusIV.getParameters());
                if (!this.forWrapping) {
                    throw new IllegalArgumentException("You should not supply an IV for unwrapping");
                } else {
                    IllegalArgumentException v4_13 = this.iv;
                    if ((v4_13 == null) || (v4_13.length != 8)) {
                        throw new IllegalArgumentException("IV is not 8 octets");
                    }
                }
            }
        } else {
            this.param = ((org.spongycastle.crypto.params.KeyParameter) v4_2);
            if (this.forWrapping) {
                IllegalArgumentException v4_19 = new byte[8];
                this.iv = v4_19;
                v5_1.nextBytes(this.iv);
                this.paramPlusIV = new org.spongycastle.crypto.params.ParametersWithIV(this.param, this.iv);
            }
        }
        return;
    }

Method org.spongycastle.crypto.encodings.PKCS1Encoding.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p3, org.spongycastle.crypto.CipherParameters p4)
    {
        org.spongycastle.crypto.params.AsymmetricKeyParameter v0_4;
        if (!(p4 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            v0_4 = ((org.spongycastle.crypto.params.AsymmetricKeyParameter) p4);
            if ((!((org.spongycastle.crypto.params.AsymmetricKeyParameter) p4).isPrivate()) && (p3 != null)) {
                this.random = new java.security.SecureRandom();
            }
        } else {
            this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p4).getRandom();
            v0_4 = ((org.spongycastle.crypto.params.AsymmetricKeyParameter) ((org.spongycastle.crypto.params.ParametersWithRandom) p4).getParameters());
        }
        this.engine.init(p3, p4);
        this.forPrivateKey = v0_4.isPrivate();
        this.forEncryption = p3;
        IllegalArgumentException v3_3 = new byte[this.engine.getOutputBlockSize()];
        this.blockBuffer = v3_3;
        if ((this.pLen > 0) && ((this.fallback == null) && (this.random == null))) {
            throw new IllegalArgumentException("encoder requires random");
        } else {
            return;
        }
    }

Method org.spongycastle.crypto.encodings.OAEPEncoding.init() calling method java.security.SecureRandom.<init>()


    public void init(boolean p2, org.spongycastle.crypto.CipherParameters p3)
    {
        if (!(p3 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            this.random = new java.security.SecureRandom();
        } else {
            this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p3).getRandom();
        }
        this.engine.init(p2, p3);
        this.forEncryption = p2;
        return;
    }

Method org.spongycastle.crypto.ec.ECNewPublicKeyTransform.init() calling method java.security.SecureRandom.<init>()


    public void init(org.spongycastle.crypto.CipherParameters p2)
    {
        if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            if (!(p2 instanceof org.spongycastle.crypto.params.ECPublicKeyParameters)) {
                throw new IllegalArgumentException("ECPublicKeyParameters are required for new public key transform.");
            } else {
                this.key = ((org.spongycastle.crypto.params.ECPublicKeyParameters) p2);
                this.random = new java.security.SecureRandom();
            }
        } else {
            if (!(((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters() instanceof org.spongycastle.crypto.params.ECPublicKeyParameters)) {
                throw new IllegalArgumentException("ECPublicKeyParameters are required for new public key transform.");
            } else {
                this.key = ((org.spongycastle.crypto.params.ECPublicKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
                this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
            }
        }
        return;
    }

Method org.spongycastle.crypto.ec.ECElGamalEncryptor.init() calling method java.security.SecureRandom.<init>()


    public void init(org.spongycastle.crypto.CipherParameters p2)
    {
        if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            if (!(p2 instanceof org.spongycastle.crypto.params.ECPublicKeyParameters)) {
                throw new IllegalArgumentException("ECPublicKeyParameters are required for encryption.");
            } else {
                this.key = ((org.spongycastle.crypto.params.ECPublicKeyParameters) p2);
                this.random = new java.security.SecureRandom();
            }
        } else {
            if (!(((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters() instanceof org.spongycastle.crypto.params.ECPublicKeyParameters)) {
                throw new IllegalArgumentException("ECPublicKeyParameters are required for encryption.");
            } else {
                this.key = ((org.spongycastle.crypto.params.ECPublicKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
                this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
            }
        }
        return;
    }

Method org.spongycastle.cms.jcajce.JceCMSMacCalculatorBuilder$CMSMacCalculator.<init>() calling method java.security.SecureRandom.<init>()


    JceCMSMacCalculatorBuilder$CMSMacCalculator(org.spongycastle.cms.jcajce.JceCMSMacCalculatorBuilder p2, org.spongycastle.asn1.ASN1ObjectIdentifier p3, int p4, java.security.SecureRandom p5)
    {
        this.this$0 = p2;
        javax.crypto.KeyGenerator v0_1 = org.spongycastle.cms.jcajce.JceCMSMacCalculatorBuilder.access$000(p2).createKeyGenerator(p3);
        if (p5 == null) {
            p5 = new java.security.SecureRandom();
        }
        this.random = p5;
        if (p4 >= null) {
            v0_1.init(p4, p5);
        } else {
            v0_1.init(p5);
        }
        this.encKey = v0_1.generateKey();
        this.algorithmIdentifier = org.spongycastle.cms.jcajce.JceCMSMacCalculatorBuilder.access$000(p2).getAlgorithmIdentifier(p3, this.generateParameterSpec(p3, this.encKey));
        this.mac = org.spongycastle.cms.jcajce.JceCMSMacCalculatorBuilder.access$000(p2).createContentMac(this.encKey, this.algorithmIdentifier);
        return;
    }

Method org.spongycastle.cms.jcajce.JceCMSContentEncryptorBuilder$CMSOutputEncryptor.<init>() calling method java.security.SecureRandom.<init>()


    JceCMSContentEncryptorBuilder$CMSOutputEncryptor(org.spongycastle.cms.jcajce.JceCMSContentEncryptorBuilder p4, org.spongycastle.asn1.ASN1ObjectIdentifier p5, int p6, java.security.SecureRandom p7)
    {
        this.this$0 = p4;
        javax.crypto.Cipher v0_3 = org.spongycastle.cms.jcajce.JceCMSContentEncryptorBuilder.access$000(p4).createKeyGenerator(p5);
        if (p7 == null) {
            p7 = new java.security.SecureRandom();
        }
        if (p6 >= null) {
            v0_3.init(p6, p7);
        } else {
            v0_3.init(p7);
        }
        this.cipher = org.spongycastle.cms.jcajce.JceCMSContentEncryptorBuilder.access$000(p4).createCipher(p5);
        this.encKey = v0_3.generateKey();
        java.security.AlgorithmParameters v6_5 = org.spongycastle.cms.jcajce.JceCMSContentEncryptorBuilder.access$000(p4).generateParameters(p5, this.encKey, p7);
        try {
            this.cipher.init(1, this.encKey, v6_5, p7);
        } catch (org.spongycastle.asn1.x509.AlgorithmIdentifier v4_1) {
            java.security.AlgorithmParameters v6_7 = new StringBuilder();
            v6_7.append("unable to initialize cipher: ");
            v6_7.append(v4_1.getMessage());
            throw new org.spongycastle.cms.CMSException(v6_7.toString(), v4_1);
        }
        if (v6_5 == null) {
            v6_5 = this.cipher.getParameters();
        }
        this.algorithmIdentifier = org.spongycastle.cms.jcajce.JceCMSContentEncryptorBuilder.access$000(p4).getAlgorithmIdentifier(p5, v6_5);
        return;
    }

Method org.spongycastle.cms.bc.BcCMSContentEncryptorBuilder$CMSOutputEncryptor.<init>() calling method java.security.SecureRandom.<init>()


    BcCMSContentEncryptorBuilder$CMSOutputEncryptor(org.spongycastle.cms.bc.BcCMSContentEncryptorBuilder p2, org.spongycastle.asn1.ASN1ObjectIdentifier p3, int p4, java.security.SecureRandom p5)
    {
        this.this$0 = p2;
        if (p5 == null) {
            p5 = new java.security.SecureRandom();
        }
        this.encKey = new org.spongycastle.crypto.params.KeyParameter(org.spongycastle.cms.bc.BcCMSContentEncryptorBuilder.access$000(p2).createKeyGenerator(p3, p5).generateKey());
        this.algorithmIdentifier = org.spongycastle.cms.bc.BcCMSContentEncryptorBuilder.access$000(p2).generateAlgorithmIdentifier(p3, this.encKey, p5);
        org.spongycastle.cms.bc.BcCMSContentEncryptorBuilder.access$000(p2);
        this.cipher = org.spongycastle.cms.bc.EnvelopedDataHelper.createContentCipher(1, this.encKey, this.algorithmIdentifier);
        return;
    }

Method org.spongycastle.cms.PasswordRecipientInfoGenerator.generate() calling method java.security.SecureRandom.<init>()


    public org.spongycastle.asn1.cms.RecipientInfo generate(org.spongycastle.operator.GenericKey p7)
    {
        org.spongycastle.asn1.x509.AlgorithmIdentifier v0_1 = new byte[this.blockSize];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v0_1);
        if (this.keyDerivationAlgorithm == null) {
            org.spongycastle.asn1.DEROctetString v1_1 = new byte[20];
            this.random.nextBytes(v1_1);
            this.keyDerivationAlgorithm = new org.spongycastle.asn1.x509.AlgorithmIdentifier(org.spongycastle.asn1.pkcs.PKCSObjectIdentifiers.id_PBKDF2, new org.spongycastle.asn1.pkcs.PBKDF2Params(v1_1, 1024));
        }
        org.spongycastle.asn1.DEROctetString v1_6 = new org.spongycastle.asn1.DEROctetString(this.generateEncryptedBytes(new org.spongycastle.asn1.x509.AlgorithmIdentifier(this.kekAlgorithm, new org.spongycastle.asn1.DEROctetString(v0_1)), this.calculateDerivedKey(this.schemeID, this.keyDerivationAlgorithm, this.keySize), p7));
        org.spongycastle.asn1.cms.RecipientInfo v7_3 = new org.spongycastle.asn1.ASN1EncodableVector();
        v7_3.add(this.kekAlgorithm);
        v7_3.add(new org.spongycastle.asn1.DEROctetString(v0_1));
        return new org.spongycastle.asn1.cms.RecipientInfo(new org.spongycastle.asn1.cms.PasswordRecipientInfo(this.keyDerivationAlgorithm, new org.spongycastle.asn1.x509.AlgorithmIdentifier(org.spongycastle.asn1.pkcs.PKCSObjectIdentifiers.id_alg_PWRI_KEK, new org.spongycastle.asn1.DERSequence(v7_3)), v1_6));
    }

Method org.spongycastle.cert.crmf.jcajce.JceCRMFEncryptorBuilder$CRMFOutputEncryptor.<init>() calling method java.security.SecureRandom.<init>()


    JceCRMFEncryptorBuilder$CRMFOutputEncryptor(org.spongycastle.cert.crmf.jcajce.JceCRMFEncryptorBuilder p4, org.spongycastle.asn1.ASN1ObjectIdentifier p5, int p6, java.security.SecureRandom p7)
    {
        this.this$0 = p4;
        javax.crypto.Cipher v0_3 = org.spongycastle.cert.crmf.jcajce.JceCRMFEncryptorBuilder.access$000(p4).createKeyGenerator(p5);
        if (p7 == null) {
            p7 = new java.security.SecureRandom();
        }
        if (p6 < null) {
            p6 = org.spongycastle.cert.crmf.jcajce.JceCRMFEncryptorBuilder.access$100().getKeySize(p5);
        }
        if (p6 >= null) {
            v0_3.init(p6, p7);
        } else {
            v0_3.init(p7);
        }
        this.cipher = org.spongycastle.cert.crmf.jcajce.JceCRMFEncryptorBuilder.access$000(p4).createCipher(p5);
        this.encKey = v0_3.generateKey();
        java.security.AlgorithmParameters v6_6 = org.spongycastle.cert.crmf.jcajce.JceCRMFEncryptorBuilder.access$000(p4).generateParameters(p5, this.encKey, p7);
        try {
            this.cipher.init(1, this.encKey, v6_6, p7);
        } catch (org.spongycastle.asn1.x509.AlgorithmIdentifier v4_1) {
            java.security.AlgorithmParameters v6_8 = new StringBuilder();
            v6_8.append("unable to initialize cipher: ");
            v6_8.append(v4_1.getMessage());
            throw new org.spongycastle.cert.crmf.CRMFException(v6_8.toString(), v4_1);
        }
        if (v6_6 == null) {
            v6_6 = this.cipher.getParameters();
        }
        this.algorithmIdentifier = org.spongycastle.cert.crmf.jcajce.JceCRMFEncryptorBuilder.access$000(p4).getAlgorithmIdentifier(p5, v6_6);
        return;
    }

Method org.spongycastle.cert.crmf.bc.BcFixedLengthMGF1Padder.getPaddedData() calling method java.security.SecureRandom.<init>()


    public byte[] getPaddedData(byte[] p7)
    {
        byte[] v0_1 = new byte[this.length];
        byte[] v1_2 = new byte[this.dig.getDigestSize()];
        byte[] v2_1 = new byte[(this.length - this.dig.getDigestSize())];
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(v1_2);
        byte v3_5 = new org.spongycastle.crypto.generators.MGF1BytesGenerator(this.dig);
        v3_5.init(new org.spongycastle.crypto.params.MGFParameters(v1_2));
        int v5 = 0;
        v3_5.generateBytes(v2_1, 0, v2_1.length);
        System.arraycopy(v1_2, 0, v0_1, 0, v1_2.length);
        System.arraycopy(p7, 0, v0_1, v1_2.length, p7.length);
        byte v3_9 = (v1_2.length + p7.length);
        while(true) {
            v3_9++;
            if (v3_9 == v0_1.length) {
                break;
            }
            v0_1[v3_9] = ((byte) (this.random.nextInt(255) + 1));
        }
        while (v5 != v2_1.length) {
            int v7_5 = (v1_2.length + v5);
            v0_1[v7_5] = ((byte) (v0_1[v7_5] ^ v2_1[v5]));
            v5++;
        }
        return v0_1;
    }

Method com.sophos.cloud.core.c.p.a() calling method java.security.SecureRandom.<init>()


    public void a(javax.net.ssl.HttpsURLConnection p6)
    {
        if (android.os.Build$VERSION.SDK_INT < 24) {
            try {
                javax.net.ssl.SSLContext v1_1;
                com.sophos.cloud.core.c.k v0_9 = com.sophos.cloud.core.c.l.a(this.a);
                v0_9.b(this.c);
            } catch (Exception v6_1) {
                com.sophos.smsec.core.smsectrace.d.c("TM", "TLS init failed", v6_1);
            }
            if (this.b) {
                v1_1 = 0;
            } else {
                v1_1 = 1;
            }
            v0_9.a(v1_1);
            javax.net.ssl.SSLContext v1_3 = javax.net.ssl.SSLContext.getInstance("TLS");
            javax.net.ssl.TrustManager[] v2_0 = new javax.net.ssl.TrustManager[1];
            v2_0[0] = v0_9;
            v1_3.init(0, v2_0, new java.security.SecureRandom());
            p6.setSSLSocketFactory(v1_3.getSocketFactory());
            if (this.b) {
                p6.setHostnameVerifier(new com.sophos.cloud.core.c.k(0));
            }
        } else {
            this.b(p6);
        }
        return;
    }

Method com.sophos.cloud.core.c.p.b() calling method java.security.SecureRandom.<init>()


    private void b(javax.net.ssl.HttpsURLConnection p6)
    {
        try {
            javax.net.ssl.SSLContext v1_0;
            com.sophos.cloud.core.c.k v0_3 = com.sophos.cloud.core.c.m.a(this.a);
            v0_3.b(this.c);
        } catch (Exception v6_1) {
            com.sophos.smsec.core.smsectrace.d.c("TM", "TLS init failed", v6_1);
            return;
        }
        if (this.b) {
            v1_0 = 0;
        } else {
            v1_0 = 1;
        }
        v0_3.a(v1_0);
        javax.net.ssl.SSLContext v1_2 = javax.net.ssl.SSLContext.getInstance("TLS");
        javax.net.ssl.TrustManager[] v2_0 = new javax.net.ssl.TrustManager[1];
        v2_0[0] = v0_3;
        v1_2.init(0, v2_0, new java.security.SecureRandom());
        p6.setSSLSocketFactory(v1_2.getSocketFactory());
        if (!this.b) {
            return;
        } else {
            p6.setHostnameVerifier(new com.sophos.cloud.core.c.k(0));
            return;
        }
    }

Method com.microsoft.identity.common.adal.internal.cache.StorageHelper.<init>() calling method java.security.SecureRandom.<init>()


    public StorageHelper(android.content.Context p2)
    {
        this.mKey = 0;
        this.mHMACKey = 0;
        this.mSecretKeyFromAndroidKeyStore = 0;
        this.mContext = p2.getApplicationContext();
        this.mRandom = new java.security.SecureRandom();
        return;
    }

Method org.spongycastle.openssl.jcajce.JcePEMEncryptorBuilder.build() calling method java.security.SecureRandom.<init>()


    public org.spongycastle.openssl.PEMEncryptor build(char[] p3)
    {
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        byte[] v0_1;
        if (!this.algorithm.startsWith("AES-")) {
            v0_1 = 8;
        } else {
            v0_1 = 16;
        }
        byte[] v0_2 = new byte[v0_1];
        this.random.nextBytes(v0_2);
        return new org.spongycastle.openssl.jcajce.JcePEMEncryptorBuilder$1(this, v0_2, p3);
    }

Method org.spongycastle.openssl.jcajce.JceOpenSSLPKCS8EncryptorBuilder.build() calling method java.security.SecureRandom.<init>()


    public org.spongycastle.operator.OutputEncryptor build()
    {
        java.security.GeneralSecurityException v0_1 = new byte[20];
        this.salt = v0_1;
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        this.random.nextBytes(this.salt);
        try {
            this.cipher = this.helper.createCipher(this.algOID.getId());
        } catch (java.security.GeneralSecurityException v0_14) {
            String v2_10 = new StringBuilder();
            v2_10.append(this.algOID);
            v2_10.append(" not available: ");
            v2_10.append(v0_14.getMessage());
            throw new org.spongycastle.operator.OperatorCreationException(v2_10.toString(), v0_14);
        }
        if (org.spongycastle.openssl.jcajce.PEMUtilities.isPKCS5Scheme2(this.algOID)) {
            this.paramGen = this.helper.createAlgorithmParameterGenerator(this.algOID.getId());
        }
        java.security.GeneralSecurityException v0_6;
        if (!org.spongycastle.openssl.jcajce.PEMUtilities.isPKCS5Scheme2(this.algOID)) {
            if (!org.spongycastle.openssl.jcajce.PEMUtilities.isPKCS12(this.algOID)) {
                org.spongycastle.operator.OperatorCreationException v1_14 = new StringBuilder();
                v1_14.append("unknown algorithm: ");
                v1_14.append(this.algOID);
                throw new org.spongycastle.operator.OperatorCreationException(v1_14.toString(), 0);
            } else {
                java.security.GeneralSecurityException v0_25 = new org.spongycastle.asn1.ASN1EncodableVector();
                v0_25.add(new org.spongycastle.asn1.DEROctetString(this.salt));
                v0_25.add(new org.spongycastle.asn1.ASN1Integer(((long) this.iterationCount)));
                String v2_20 = new org.spongycastle.asn1.x509.AlgorithmIdentifier(this.algOID, org.spongycastle.asn1.pkcs.PKCS12PBEParams.getInstance(new org.spongycastle.asn1.DERSequence(v0_25)));
                try {
                    this.cipher.init(1, new org.spongycastle.jcajce.PKCS12KeyWithParameters(this.password, this.salt, this.iterationCount));
                    v0_6 = v2_20;
                } catch (java.security.GeneralSecurityException v0_29) {
                    throw new org.spongycastle.operator.OperatorCreationException(v0_29.getMessage(), v0_29);
                }
            }
        } else {
            this.params = this.paramGen.generateParameters();
            try {
                java.security.GeneralSecurityException v0_3 = new org.spongycastle.asn1.pkcs.KeyDerivationFunc(this.algOID, org.spongycastle.asn1.ASN1Primitive.fromByteArray(this.params.getEncoded()));
                String v2_2 = new org.spongycastle.asn1.pkcs.KeyDerivationFunc(org.spongycastle.asn1.pkcs.PKCSObjectIdentifiers.id_PBKDF2, new org.spongycastle.asn1.pkcs.PBKDF2Params(this.salt, this.iterationCount));
                org.spongycastle.jcajce.PKCS12KeyWithParameters v3_5 = new org.spongycastle.asn1.ASN1EncodableVector();
                v3_5.add(v2_2);
                v3_5.add(v0_3);
                v0_6 = new org.spongycastle.asn1.x509.AlgorithmIdentifier(org.spongycastle.asn1.pkcs.PKCSObjectIdentifiers.id_PBES2, org.spongycastle.asn1.pkcs.PBES2Parameters.getInstance(new org.spongycastle.asn1.DERSequence(v3_5)));
                try {
                    this.key = org.spongycastle.openssl.jcajce.PEMUtilities.generateSecretKeyForPKCS5Scheme2(this.helper, this.algOID.getId(), this.password, this.salt, this.iterationCount);
                    this.cipher.init(1, this.key, this.params);
                } catch (java.security.GeneralSecurityException v0_8) {
                    throw new org.spongycastle.operator.OperatorCreationException(v0_8.getMessage(), v0_8);
                }
            } catch (java.security.GeneralSecurityException v0_7) {
                throw new org.spongycastle.operator.OperatorCreationException(v0_7.getMessage(), v0_7);
            }
        }
        return new org.spongycastle.openssl.jcajce.JceOpenSSLPKCS8EncryptorBuilder$1(this, v0_6);
    }

Method org.spongycastle.openpgp.operator.jcajce.JcePBESecretKeyEncryptorBuilder.build() calling method java.security.SecureRandom.<init>()


    public org.spongycastle.openpgp.operator.PBESecretKeyEncryptor build(char[] p9)
    {
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        org.spongycastle.openpgp.operator.jcajce.JcePBESecretKeyEncryptorBuilder$1 v0_3 = new org.spongycastle.openpgp.operator.jcajce.JcePBESecretKeyEncryptorBuilder$1;
        v0_3(this, this.encAlgorithm, this.s2kDigestCalculator, this.s2kCount, this.random, p9);
        return v0_3;
    }

Method org.spongycastle.openpgp.operator.bc.BcPBESecretKeyEncryptorBuilder.build() calling method java.security.SecureRandom.<init>()


    public org.spongycastle.openpgp.operator.PBESecretKeyEncryptor build(char[] p9)
    {
        if (this.random == null) {
            this.random = new java.security.SecureRandom();
        }
        org.spongycastle.openpgp.operator.bc.BcPBESecretKeyEncryptorBuilder$1 v0_3 = new org.spongycastle.openpgp.operator.bc.BcPBESecretKeyEncryptorBuilder$1;
        v0_3(this, this.encAlgorithm, this.s2kDigestCalculator, this.s2kCount, this.random, p9);
        return v0_3;
    }

Method org.spongycastle.openpgp.examples.PBEFileProcessor.encryptFile() calling method java.security.SecureRandom.<init>()


    private static void encryptFile(java.io.OutputStream p3, String p4, char[] p5, boolean p6, boolean p7)
    {
        if (p6) {
            p3 = new org.spongycastle.bcpg.ArmoredOutputStream(p3);
        }
        try {
            Exception v4_3 = org.spongycastle.openpgp.examples.PGPExampleUtil.compressFile(p4, 1);
            org.spongycastle.openpgp.PGPEncryptedDataGenerator v0_2 = new org.spongycastle.openpgp.PGPEncryptedDataGenerator(new org.spongycastle.openpgp.operator.jcajce.JcePGPDataEncryptorBuilder(3).setWithIntegrityPacket(p7).setSecureRandom(new java.security.SecureRandom()).setProvider("SC"));
            v0_2.addMethod(new org.spongycastle.openpgp.operator.jcajce.JcePBEKeyEncryptionMethodGenerator(p5).setProvider("SC"));
            java.io.OutputStream v5_4 = v0_2.open(p3, ((long) v4_3.length));
            v5_4.write(v4_3);
            v5_4.close();
        } catch (Exception v3_1) {
            System.err.println(v3_1);
            if (v3_1.getUnderlyingException() == null) {
                return;
            } else {
                v3_1.getUnderlyingException().printStackTrace();
                return;
            }
        }
        if (!p6) {
            return;
        } else {
            p3.close();
            return;
        }
    }

Method org.spongycastle.openpgp.examples.KeyBasedLargeFileProcessor.encryptFile() calling method java.security.SecureRandom.<init>()


    private static void encryptFile(java.io.OutputStream p4, String p5, org.spongycastle.openpgp.PGPPublicKey p6, boolean p7, boolean p8)
    {
        if (p7) {
            p4 = new org.spongycastle.bcpg.ArmoredOutputStream(p4);
        }
        try {
            org.spongycastle.openpgp.PGPCompressedDataGenerator v0_1 = new org.spongycastle.openpgp.PGPEncryptedDataGenerator(new org.spongycastle.openpgp.operator.jcajce.JcePGPDataEncryptorBuilder(3).setWithIntegrityPacket(p8).setSecureRandom(new java.security.SecureRandom()).setProvider("SC"));
            v0_1.addMethod(new org.spongycastle.openpgp.operator.jcajce.JcePublicKeyKeyEncryptionMethodGenerator(p6).setProvider("SC"));
            java.io.OutputStream v8_5 = new byte[65536];
            java.io.OutputStream v8_6 = v0_1.open(p4, v8_5);
            org.spongycastle.openpgp.PGPCompressedDataGenerator v0_4 = new org.spongycastle.openpgp.PGPCompressedDataGenerator(1);
            Exception v5_1 = new byte[65536];
            org.spongycastle.openpgp.PGPUtil.writeFileToLiteralData(v0_4.open(v8_6), 98, new java.io.File(p5), v5_1);
            v0_4.close();
            v8_6.close();
        } catch (Exception v4_1) {
            System.err.println(v4_1);
            if (v4_1.getUnderlyingException() == null) {
                return;
            } else {
                v4_1.getUnderlyingException().printStackTrace();
                return;
            }
        }
        if (!p7) {
            return;
        } else {
            p4.close();
            return;
        }
    }

Method org.spongycastle.openpgp.examples.KeyBasedFileProcessor.encryptFile() calling method java.security.SecureRandom.<init>()


    private static void encryptFile(java.io.OutputStream p3, String p4, org.spongycastle.openpgp.PGPPublicKey p5, boolean p6, boolean p7)
    {
        if (p6) {
            p3 = new org.spongycastle.bcpg.ArmoredOutputStream(p3);
        }
        try {
            Exception v4_3 = org.spongycastle.openpgp.examples.PGPExampleUtil.compressFile(p4, 1);
            org.spongycastle.openpgp.PGPEncryptedDataGenerator v0_2 = new org.spongycastle.openpgp.PGPEncryptedDataGenerator(new org.spongycastle.openpgp.operator.jcajce.JcePGPDataEncryptorBuilder(3).setWithIntegrityPacket(p7).setSecureRandom(new java.security.SecureRandom()).setProvider("SC"));
            v0_2.addMethod(new org.spongycastle.openpgp.operator.jcajce.JcePublicKeyKeyEncryptionMethodGenerator(p5).setProvider("SC"));
            java.io.OutputStream v5_4 = v0_2.open(p3, ((long) v4_3.length));
            v5_4.write(v4_3);
            v5_4.close();
        } catch (Exception v3_1) {
            System.err.println(v3_1);
            if (v3_1.getUnderlyingException() == null) {
                return;
            } else {
                v3_1.getUnderlyingException().printStackTrace();
                return;
            }
        }
        if (!p6) {
            return;
        } else {
            p3.close();
            return;
        }
    }

Method org.spongycastle.openpgp.examples.ByteArrayHandler.encrypt() calling method java.security.SecureRandom.<init>()


    public static byte[] encrypt(byte[] p4, char[] p5, String p6, int p7, boolean p8)
    {
        if (p6 == null) {
            p6 = "_CONSOLE";
        }
        java.io.ByteArrayOutputStream v0_0;
        byte[] v4_2 = org.spongycastle.openpgp.examples.ByteArrayHandler.compress(p4, p6, 1);
        java.io.ByteArrayOutputStream v6_2 = new java.io.ByteArrayOutputStream();
        if (!p8) {
            v0_0 = v6_2;
        } else {
            v0_0 = new org.spongycastle.bcpg.ArmoredOutputStream(v6_2);
        }
        org.spongycastle.openpgp.PGPEncryptedDataGenerator v1_1 = new org.spongycastle.openpgp.PGPEncryptedDataGenerator(new org.spongycastle.openpgp.operator.jcajce.JcePGPDataEncryptorBuilder(p7).setSecureRandom(new java.security.SecureRandom()).setProvider("SC"));
        v1_1.addMethod(new org.spongycastle.openpgp.operator.jcajce.JcePBEKeyEncryptionMethodGenerator(p5).setProvider("SC"));
        java.io.OutputStream v5_4 = v1_1.open(v0_0, ((long) v4_2.length));
        v5_4.write(v4_2);
        v5_4.close();
        if (p8) {
            v0_0.close();
        }
        return v6_2.toByteArray();
    }

Method org.spongycastle.math.ec.tools.TraceOptimizer.<clinit>() calling method java.security.SecureRandom.<init>()


    static TraceOptimizer()
    {
        org.spongycastle.math.ec.tools.TraceOptimizer.ONE = java.math.BigInteger.valueOf(1);
        org.spongycastle.math.ec.tools.TraceOptimizer.R = new java.security.SecureRandom();
        return;
    }

Method org.spongycastle.math.ec.tools.DiscoverEndomorphisms.findBetaValues() calling method java.security.SecureRandom.<init>()


    private static org.spongycastle.math.ec.ECFieldElement[] findBetaValues(org.spongycastle.math.ec.ECCurve p5)
    {
        org.spongycastle.math.ec.ECFieldElement[] v0_3 = p5.getField().getCharacteristic();
        do {
            java.math.BigInteger v3_1 = org.spongycastle.util.BigIntegers.createRandomInRange(org.spongycastle.math.ec.ECConstants.TWO, v0_3.subtract(org.spongycastle.math.ec.ECConstants.TWO), new java.security.SecureRandom()).modPow(v0_3.divide(org.spongycastle.math.ec.ECConstants.THREE), v0_3);
        } while(v3_1.equals(org.spongycastle.math.ec.ECConstants.ONE));
        org.spongycastle.math.ec.ECFieldElement v5_1 = p5.fromBigInteger(v3_1);
        org.spongycastle.math.ec.ECFieldElement[] v0_2 = new org.spongycastle.math.ec.ECFieldElement[2];
        v0_2[0] = v5_1;
        v0_2[1] = v5_1.square();
        return v0_2;
    }

Method org.spongycastle.jcajce.provider.symmetric.util.BaseKeyGenerator.engineInit() calling method java.security.SecureRandom.<init>()


    protected void engineInit(int p3, java.security.SecureRandom p4)
    {
        if (p4 == null) {
            try {
                p4 = new java.security.SecureRandom();
            } catch (String v3_2) {
                throw new java.security.InvalidParameterException(v3_2.getMessage());
            }
        }
        this.engine.init(new org.spongycastle.crypto.KeyGenerationParameters(p4, p3));
        this.uninitialised = 0;
        return;
    }

Method org.spongycastle.jcajce.provider.symmetric.util.BaseKeyGenerator.engineGenerateKey() calling method java.security.SecureRandom.<init>()


    protected javax.crypto.SecretKey engineGenerateKey()
    {
        if (this.uninitialised) {
            this.engine.init(new org.spongycastle.crypto.KeyGenerationParameters(new java.security.SecureRandom(), this.defaultKeySize));
            this.uninitialised = 0;
        }
        return new javax.crypto.spec.SecretKeySpec(this.engine.generateKey(), this.algName);
    }

Method org.spongycastle.jcajce.provider.asymmetric.rsa.KeyPairGeneratorSpi.<init>() calling method java.security.SecureRandom.<init>()


    public KeyPairGeneratorSpi()
    {
        super("RSA");
        super.engine = new org.spongycastle.crypto.generators.RSAKeyPairGenerator();
        super.param = new org.spongycastle.crypto.params.RSAKeyGenerationParameters(org.spongycastle.jcajce.provider.asymmetric.rsa.KeyPairGeneratorSpi.defaultPublicExponent, new java.security.SecureRandom(), 2048, 112);
        super.engine.init(super.param);
        return;
    }

Method org.spongycastle.jcajce.provider.asymmetric.ies.CipherSpi.engineInit() calling method java.security.SecureRandom.<init>()


    protected void engineInit(int p5, java.security.Key p6, java.security.spec.AlgorithmParameterSpec p7, java.security.SecureRandom p8)
    {
        if (!(p6 instanceof org.spongycastle.jce.interfaces.IESKey)) {
            throw new java.security.InvalidKeyException("must be passed IES key");
        } else {
            if ((p7 != null) || ((p5 != 1) && (p5 != 3))) {
                if (!(p7 instanceof org.spongycastle.jce.spec.IESParameterSpec)) {
                    throw new java.security.InvalidAlgorithmParameterException("must be passed IES parameters");
                }
            } else {
                java.io.ByteArrayOutputStream v1_0 = new byte[16];
                org.spongycastle.crypto.params.IESParameters v7_2 = new byte[16];
                if (p8 == null) {
                    p8 = new java.security.SecureRandom();
                }
                p8.nextBytes(v1_0);
                p8.nextBytes(v7_2);
                p7 = new org.spongycastle.jce.spec.IESParameterSpec(v1_0, v7_2, 128);
            }
            org.spongycastle.crypto.params.AsymmetricKeyParameter v8_8;
            String v6_5;
            if (!(((org.spongycastle.jce.interfaces.IESKey) p6).getPublic() instanceof javax.crypto.interfaces.DHPublicKey)) {
                v8_8 = org.spongycastle.jcajce.provider.asymmetric.util.ECUtil.generatePublicKeyParameter(((org.spongycastle.jce.interfaces.IESKey) p6).getPublic());
                v6_5 = org.spongycastle.jcajce.provider.asymmetric.util.ECUtil.generatePrivateKeyParameter(((org.spongycastle.jce.interfaces.IESKey) p6).getPrivate());
            } else {
                v8_8 = org.spongycastle.jcajce.provider.asymmetric.util.DHUtil.generatePublicKeyParameter(((org.spongycastle.jce.interfaces.IESKey) p6).getPublic());
                v6_5 = org.spongycastle.jcajce.provider.asymmetric.util.DHUtil.generatePrivateKeyParameter(((org.spongycastle.jce.interfaces.IESKey) p6).getPrivate());
            }
            this.engineParams = ((org.spongycastle.jce.spec.IESParameterSpec) p7);
            org.spongycastle.crypto.params.IESParameters v7_5 = new org.spongycastle.crypto.params.IESParameters(this.engineParams.getDerivationV(), this.engineParams.getEncodingV(), this.engineParams.getMacKeySize());
            this.state = p5;
            this.buffer.reset();
            switch (p5) {
                case 1:
                case 3:
                    this.cipher.init(1, v6_5, v8_8, v7_5);
                    break;
                case 2:
                case 4:
                    this.cipher.init(0, v6_5, v8_8, v7_5);
                    break;
                default:
                    System.out.println("eeek!");
            }
            return;
        }
    }

Method org.spongycastle.jcajce.provider.asymmetric.gost.KeyPairGeneratorSpi.generateKeyPair() calling method java.security.SecureRandom.<init>()


    public java.security.KeyPair generateKeyPair()
    {
        if (!this.initialised) {
            this.init(new org.spongycastle.jce.spec.GOST3410ParameterSpec(org.spongycastle.asn1.cryptopro.CryptoProObjectIdentifiers.gostR3410_94_CryptoPro_A.getId()), new java.security.SecureRandom());
        }
        org.spongycastle.crypto.params.GOST3410PrivateKeyParameters v0_2 = this.engine.generateKeyPair();
        return new java.security.KeyPair(new org.spongycastle.jcajce.provider.asymmetric.gost.BCGOST3410PublicKey(((org.spongycastle.crypto.params.GOST3410PublicKeyParameters) v0_2.getPublic()), this.gost3410Params), new org.spongycastle.jcajce.provider.asymmetric.gost.BCGOST3410PrivateKey(((org.spongycastle.crypto.params.GOST3410PrivateKeyParameters) v0_2.getPrivate()), this.gost3410Params));
    }

Method org.spongycastle.jcajce.provider.asymmetric.elgamal.KeyPairGeneratorSpi.<init>() calling method java.security.SecureRandom.<init>()


    public KeyPairGeneratorSpi()
    {
        super("ElGamal");
        super.engine = new org.spongycastle.crypto.generators.ElGamalKeyPairGenerator();
        super.strength = 1024;
        super.certainty = 20;
        super.random = new java.security.SecureRandom();
        super.initialised = 0;
        return;
    }

Method org.spongycastle.jcajce.provider.asymmetric.dsa.KeyPairGeneratorSpi.<init>() calling method java.security.SecureRandom.<init>()


    public KeyPairGeneratorSpi()
    {
        super("DSA");
        super.engine = new org.spongycastle.crypto.generators.DSAKeyPairGenerator();
        super.strength = 1024;
        super.certainty = 20;
        super.random = new java.security.SecureRandom();
        super.initialised = 0;
        return;
    }

Method org.spongycastle.jcajce.provider.asymmetric.dh.KeyPairGeneratorSpi.<init>() calling method java.security.SecureRandom.<init>()


    public KeyPairGeneratorSpi()
    {
        super("DH");
        super.engine = new org.spongycastle.crypto.generators.DHBasicKeyPairGenerator();
        super.strength = 1024;
        super.certainty = 20;
        super.random = new java.security.SecureRandom();
        super.initialised = 0;
        return;
    }

Method org.spongycastle.crypto.prng.X931SecureRandomBuilder.<init>() calling method java.security.SecureRandom.<init>()


    public X931SecureRandomBuilder()
    {
        this(new java.security.SecureRandom(), 0);
        return;
    }

Method org.spongycastle.crypto.prng.X931SecureRandom.<init>() calling method java.security.SecureRandom.<init>()


    X931SecureRandom(java.security.SecureRandom p1, org.spongycastle.crypto.prng.X931RNG p2, boolean p3)
    {
        this.randomSource = p1;
        this.drbg = p2;
        this.predictionResistant = p3;
        return;
    }

Method org.spongycastle.crypto.prng.SP800SecureRandomBuilder.<init>() calling method java.security.SecureRandom.<init>()


    public SP800SecureRandomBuilder()
    {
        this(new java.security.SecureRandom(), 0);
        return;
    }

Method org.spongycastle.crypto.prng.SP800SecureRandom.<init>() calling method java.security.SecureRandom.<init>()


    SP800SecureRandom(java.security.SecureRandom p1, org.spongycastle.crypto.prng.EntropySource p2, org.spongycastle.crypto.prng.DRBGProvider p3, boolean p4)
    {
        this.randomSource = p1;
        this.entropySource = p2;
        this.drbgProvider = p3;
        this.predictionResistant = p4;
        return;
    }

Method org.spongycastle.crypto.prng.FixedSecureRandom.<init>() calling method java.security.SecureRandom.<init>()


    public FixedSecureRandom(boolean p4, byte[][] p5)
    {
        java.io.ByteArrayOutputStream v0_1 = new java.io.ByteArrayOutputStream();
        int v1 = 0;
        while (v1 != p5.length) {
            try {
                v0_1.write(p5[v1]);
                v1++;
            } catch (java.io.IOException) {
                throw new IllegalArgumentException("can\'t save value array.");
            }
        }
        this._data = v0_1.toByteArray();
        if (p4 != 0) {
            this._intPad = (this._data.length % 4);
        }
        return;
    }

Method org.spongycastle.crypto.generators.RSABlindingFactorGenerator.init() calling method java.security.SecureRandom.<init>()


    public void init(org.spongycastle.crypto.CipherParameters p2)
    {
        if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            this.key = ((org.spongycastle.crypto.params.RSAKeyParameters) p2);
            this.random = new java.security.SecureRandom();
        } else {
            this.key = ((org.spongycastle.crypto.params.RSAKeyParameters) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
            this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
        }
        if ((this.key instanceof org.spongycastle.crypto.params.RSAPrivateCrtKeyParameters)) {
            throw new IllegalArgumentException("generator requires RSA public key");
        } else {
            return;
        }
    }

Method org.spongycastle.crypto.examples.JPAKEExample.main() calling method java.security.SecureRandom.<init>()


    public static void main(String[] p12)
    {
        java.io.PrintStream v12_0 = org.spongycastle.crypto.agreement.jpake.JPAKEPrimeOrderGroups.NIST_3072;
        String v0_3 = v12_0.getP();
        org.spongycastle.crypto.agreement.jpake.JPAKERound3Payload v1_28 = v12_0.getQ();
        String v2_58 = v12_0.getG();
        System.out.println("********* Initialization **********");
        System.out.println("Public parameters for the cyclic group:");
        String v5_4 = new StringBuilder();
        v5_4.append("p (");
        v5_4.append(v0_3.bitLength());
        v5_4.append(" bits): ");
        v5_4.append(v0_3.toString(16));
        System.out.println(v5_4.toString());
        String v5_8 = new StringBuilder();
        v5_8.append("q (");
        v5_8.append(v1_28.bitLength());
        v5_8.append(" bits): ");
        v5_8.append(v1_28.toString(16));
        System.out.println(v5_8.toString());
        String v5_17 = new StringBuilder();
        v5_17.append("g (");
        v5_17.append(v0_3.bitLength());
        v5_17.append(" bits): ");
        v5_17.append(v2_58.toString(16));
        System.out.println(v5_17.toString());
        String v5_20 = new StringBuilder();
        v5_20.append("p mod q = ");
        v5_20.append(v0_3.mod(v1_28).toString(16));
        System.out.println(v5_20.toString());
        String v5_23 = new StringBuilder();
        v5_23.append("g^{q} mod p = ");
        v5_23.append(v2_58.modPow(v1_28, v0_3).toString(16));
        System.out.println(v5_23.toString());
        System.out.println("");
        org.spongycastle.crypto.agreement.jpake.JPAKERound3Payload v1_38 = new StringBuilder();
        v1_38.append("(Secret passwords used by Alice and Bob: \"");
        v1_38.append("password");
        v1_38.append("\" and \"");
        v1_38.append("password");
        v1_38.append("\")\n");
        System.out.println(v1_38.toString());
        org.spongycastle.crypto.agreement.jpake.JPAKEParticipant v10 = new org.spongycastle.crypto.agreement.jpake.JPAKEParticipant;
        java.io.PrintStream v3_0 = v12_0;
        String v4_0 = new org.spongycastle.crypto.digests.SHA256Digest();
        String v5_1 = new java.security.SecureRandom();
        v10("alice", "password".toCharArray(), v3_0, v4_0, v5_1);
        org.spongycastle.crypto.agreement.jpake.JPAKEParticipant v11 = new org.spongycastle.crypto.agreement.jpake.JPAKEParticipant;
        v11("bob", "password".toCharArray(), v3_0, v4_0, v5_1);
        java.io.PrintStream v12_1 = v10.createRound1PayloadToSend();
        String v0_2 = v11.createRound1PayloadToSend();
        System.out.println("************ Round 1 **************");
        System.out.println("Alice sends to Bob: ");
        String v2_6 = new StringBuilder();
        v2_6.append("g^{x1}=");
        v2_6.append(v12_1.getGx1().toString(16));
        System.out.println(v2_6.toString());
        String v2_9 = new StringBuilder();
        v2_9.append("g^{x2}=");
        v2_9.append(v12_1.getGx2().toString(16));
        System.out.println(v2_9.toString());
        String v2_12 = new StringBuilder();
        v2_12.append("KP{x1}={");
        v2_12.append(v12_1.getKnowledgeProofForX1()[0].toString(16));
        v2_12.append("};{");
        v2_12.append(v12_1.getKnowledgeProofForX1()[1].toString(16));
        v2_12.append("}");
        System.out.println(v2_12.toString());
        String v2_15 = new StringBuilder();
        v2_15.append("KP{x2}={");
        v2_15.append(v12_1.getKnowledgeProofForX2()[0].toString(16));
        v2_15.append("};{");
        v2_15.append(v12_1.getKnowledgeProofForX2()[1].toString(16));
        v2_15.append("}");
        System.out.println(v2_15.toString());
        System.out.println("");
        System.out.println("Bob sends to Alice: ");
        String v2_20 = new StringBuilder();
        v2_20.append("g^{x3}=");
        v2_20.append(v0_2.getGx1().toString(16));
        System.out.println(v2_20.toString());
        String v2_23 = new StringBuilder();
        v2_23.append("g^{x4}=");
        v2_23.append(v0_2.getGx2().toString(16));
        System.out.println(v2_23.toString());
        String v2_26 = new StringBuilder();
        v2_26.append("KP{x3}={");
        v2_26.append(v0_2.getKnowledgeProofForX1()[0].toString(16));
        v2_26.append("};{");
        v2_26.append(v0_2.getKnowledgeProofForX1()[1].toString(16));
        v2_26.append("}");
        System.out.println(v2_26.toString());
        String v2_29 = new StringBuilder();
        v2_29.append("KP{x4}={");
        v2_29.append(v0_2.getKnowledgeProofForX2()[0].toString(16));
        v2_29.append("};{");
        v2_29.append(v0_2.getKnowledgeProofForX2()[1].toString(16));
        v2_29.append("}");
        System.out.println(v2_29.toString());
        System.out.println("");
        v10.validateRound1PayloadReceived(v0_2);
        System.out.println("Alice checks g^{x4}!=1: OK");
        System.out.println("Alice checks KP{x3}: OK");
        System.out.println("Alice checks KP{x4}: OK");
        System.out.println("");
        v11.validateRound1PayloadReceived(v12_1);
        System.out.println("Bob checks g^{x2}!=1: OK");
        System.out.println("Bob checks KP{x1},: OK");
        System.out.println("Bob checks KP{x2},: OK");
        System.out.println("");
        java.io.PrintStream v12_6 = v10.createRound2PayloadToSend();
        String v0_12 = v11.createRound2PayloadToSend();
        System.out.println("************ Round 2 **************");
        System.out.println("Alice sends to Bob: ");
        String v2_35 = new StringBuilder();
        v2_35.append("A=");
        v2_35.append(v12_6.getA().toString(16));
        System.out.println(v2_35.toString());
        String v2_38 = new StringBuilder();
        v2_38.append("KP{x2*s}={");
        v2_38.append(v12_6.getKnowledgeProofForX2s()[0].toString(16));
        v2_38.append("},{");
        v2_38.append(v12_6.getKnowledgeProofForX2s()[1].toString(16));
        v2_38.append("}");
        System.out.println(v2_38.toString());
        System.out.println("");
        System.out.println("Bob sends to Alice");
        String v2_43 = new StringBuilder();
        v2_43.append("B=");
        v2_43.append(v0_12.getA().toString(16));
        System.out.println(v2_43.toString());
        String v2_46 = new StringBuilder();
        v2_46.append("KP{x4*s}={");
        v2_46.append(v0_12.getKnowledgeProofForX2s()[0].toString(16));
        v2_46.append("},{");
        v2_46.append(v0_12.getKnowledgeProofForX2s()[1].toString(16));
        v2_46.append("}");
        System.out.println(v2_46.toString());
        System.out.println("");
        v10.validateRound2PayloadReceived(v0_12);
        System.out.println("Alice checks KP{x4*s}: OK\n");
        v11.validateRound2PayloadReceived(v12_6);
        System.out.println("Bob checks KP{x2*s}: OK\n");
        java.io.PrintStream v12_8 = v10.calculateKeyingMaterial();
        String v0_15 = v11.calculateKeyingMaterial();
        System.out.println("********* After round 2 ***********");
        String v2_51 = new StringBuilder();
        v2_51.append("Alice computes key material \t K=");
        v2_51.append(v12_8.toString(16));
        System.out.println(v2_51.toString());
        String v2_54 = new StringBuilder();
        v2_54.append("Bob computes key material \t K=");
        v2_54.append(v0_15.toString(16));
        System.out.println(v2_54.toString());
        System.out.println();
        org.spongycastle.crypto.examples.JPAKEExample.deriveSessionKey(v12_8);
        org.spongycastle.crypto.examples.JPAKEExample.deriveSessionKey(v0_15);
        org.spongycastle.crypto.agreement.jpake.JPAKERound3Payload v1_35 = v10.createRound3PayloadToSend(v12_8);
        String v2_56 = v11.createRound3PayloadToSend(v0_15);
        System.out.println("************ Round 3 **************");
        System.out.println("Alice sends to Bob: ");
        String v4_8 = new StringBuilder();
        v4_8.append("MacTag=");
        v4_8.append(v1_35.getMacTag().toString(16));
        System.out.println(v4_8.toString());
        System.out.println("");
        System.out.println("Bob sends to Alice: ");
        String v4_14 = new StringBuilder();
        v4_14.append("MacTag=");
        v4_14.append(v2_56.getMacTag().toString(16));
        System.out.println(v4_14.toString());
        System.out.println("");
        v10.validateRound3PayloadReceived(v2_56, v12_8);
        System.out.println("Alice checks MacTag: OK\n");
        v11.validateRound3PayloadReceived(v1_35, v0_15);
        System.out.println("Bob checks MacTag: OK\n");
        System.out.println();
        System.out.println("MacTags validated, therefore the keying material matches.");
        return;
    }

Method org.spongycastle.crypto.examples.DESExample.<init>() calling method java.security.SecureRandom.<init>()


    public DESExample(String p6, String p7, String p8, boolean p9)
    {
        this.encrypt = 1;
        this.cipher = 0;
        this.in = 0;
        this.out = 0;
        this.key = 0;
        this.encrypt = p9;
        try {
            this.in = new java.io.BufferedInputStream(new java.io.FileInputStream(p6));
            try {
                this.out = new java.io.BufferedOutputStream(new java.io.FileOutputStream(p7));
            } catch (java.io.IOException) {
                StringBuilder v2_5 = new StringBuilder();
                v2_5.append("Output file not created [");
                v2_5.append(p7);
                v2_5.append("]");
                System.err.println(v2_5.toString());
                System.exit(1);
            }
            if (p9 == null) {
                try {
                    java.io.BufferedOutputStream v7_6 = new java.io.BufferedInputStream(new java.io.FileInputStream(p8));
                    byte[] v9_7 = v7_6.available();
                    int v1_2 = new byte[v9_7];
                    v7_6.read(v1_2, 0, v9_7);
                    this.key = org.spongycastle.util.encoders.Hex.decode(v1_2);
                } catch (java.io.IOException) {
                    java.io.BufferedOutputStream v7_8 = new StringBuilder();
                    v7_8.append("Decryption key file not found, or not valid [");
                    v7_8.append(p8);
                    v7_8.append("]");
                    System.err.println(v7_8.toString());
                    System.exit(1);
                }
            } else {
                try {
                    java.io.BufferedOutputStream v7_11 = new java.security.SecureRandom();
                } catch (Exception) {
                    v7_11 = 0;
                    System.err.println("Hmmm, no SHA1PRNG, you need the Sun implementation");
                    System.exit(1);
                    byte[] v9_14 = new org.spongycastle.crypto.KeyGenerationParameters(v7_11, 192);
                    java.io.BufferedOutputStream v7_16 = new org.spongycastle.crypto.generators.DESedeKeyGenerator();
                    v7_16.init(v9_14);
                    this.key = v7_16.generateKey();
                    java.io.BufferedOutputStream v7_2 = new java.io.BufferedOutputStream(new java.io.FileOutputStream(p8));
                    byte[] v9_4 = org.spongycastle.util.encoders.Hex.encode(this.key);
                    v7_2.write(v9_4, 0, v9_4.length);
                    v7_2.flush();
                    v7_2.close();
                } catch (java.io.IOException) {
                    java.io.BufferedOutputStream v7_13 = new StringBuilder();
                    v7_13.append("Could not decryption create key file [");
                    v7_13.append(p8);
                    v7_13.append("]");
                    System.err.println(v7_13.toString());
                    System.exit(1);
                }
                v7_11.setSeed("www.bouncycastle.org".getBytes());
            }
            return;
        } catch (java.io.FileNotFoundException) {
            String v3_3 = new StringBuilder();
            v3_3.append("Input file not found [");
            v3_3.append(p6);
            v3_3.append("]");
            System.err.println(v3_3.toString());
            System.exit(1);
        }
    }

Method org.spongycastle.crypto.engines.CramerShoupCoreEngine.initSecureRandom() calling method java.security.SecureRandom.<init>()


    protected java.security.SecureRandom initSecureRandom(boolean p1, java.security.SecureRandom p2)
    {
        if (p1) {
            if (p2 == null) {
                p2 = new java.security.SecureRandom();
            }
        } else {
            p2 = 0;
        }
        return p2;
    }

Method org.spongycastle.crypto.agreement.jpake.JPAKEParticipant.<init>() calling method java.security.SecureRandom.<init>()


    public JPAKEParticipant(String p7, char[] p8, org.spongycastle.crypto.agreement.jpake.JPAKEPrimeOrderGroup p9)
    {
        this(p7, p8, p9, new org.spongycastle.crypto.digests.SHA256Digest(), new java.security.SecureRandom());
        return;
    }

Method org.spongycastle.crypto.agreement.DHAgreement.init() calling method java.security.SecureRandom.<init>()


    public void init(org.spongycastle.crypto.CipherParameters p2)
    {
        IllegalArgumentException v2_2;
        if (!(p2 instanceof org.spongycastle.crypto.params.ParametersWithRandom)) {
            this.random = new java.security.SecureRandom();
            v2_2 = ((org.spongycastle.crypto.params.AsymmetricKeyParameter) p2);
        } else {
            this.random = ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getRandom();
            v2_2 = ((org.spongycastle.crypto.params.AsymmetricKeyParameter) ((org.spongycastle.crypto.params.ParametersWithRandom) p2).getParameters());
        }
        if (!(v2_2 instanceof org.spongycastle.crypto.params.DHPrivateKeyParameters)) {
            throw new IllegalArgumentException("DHEngine expects DHPrivateKeyParameters");
        } else {
            this.key = ((org.spongycastle.crypto.params.DHPrivateKeyParameters) v2_2);
            this.dhParams = this.key.getParameters();
            return;
        }
    }

Method org.spongycastle.cert.crmf.PKMACBuilder.build() calling method java.security.SecureRandom.<init>()


    public org.spongycastle.operator.MacCalculator build(char[] p6)
    {
        byte[] v0_0 = this.parameters;
        if (v0_0 == null) {
            byte[] v0_2 = new byte[this.saltLength];
            if (this.random == null) {
                this.random = new java.security.SecureRandom();
            }
            this.random.nextBytes(v0_2);
            return this.genCalculator(new org.spongycastle.asn1.cmp.PBMParameter(v0_2, this.owf, this.iterationCount, this.mac), p6);
        } else {
            return this.genCalculator(v0_0, p6);
        }
    }

Method org.jscep.transaction.b.<clinit>() calling method java.security.SecureRandom.<init>()


    static b()
    {
        org.jscep.transaction.b.a = new java.security.SecureRandom();
        return;
    }

Method com.sophos.smsec.passwordtools.a.a() calling method java.security.SecureRandom.<init>()


    private static String a(String p4, int p5)
    {
        if (p5 != 0) {
            java.security.SecureRandom v0_1 = new java.security.SecureRandom();
            StringBuilder v1_1 = new StringBuilder();
            int v2 = 0;
            while (v2 < p5) {
                v1_1.append(p4.charAt(v0_1.nextInt((p4.length() - 1))));
                v2++;
            }
            return v1_1.toString();
        } else {
            return "";
        }
    }

Method com.sophos.smsec.passwordtools.a.a() calling method java.security.SecureRandom.<init>()


    private static String a(String p6)
    {
        char[] v0 = p6.toCharArray();
        java.security.SecureRandom v1_1 = new java.security.SecureRandom();
        int v2 = 0;
        while (v2 < p6.length()) {
            int v3_2 = v1_1.nextInt((p6.length() - 1));
            char v4 = v0[v2];
            v0[v2] = v0[v3_2];
            v0[v3_2] = v4;
            v2++;
        }
        return new String(v0);
    }

Method com.sophos.smsec.cloud.commands.SafetyNetCommandHandler.onHandleIntent() calling method java.security.SecureRandom.<init>()


    protected void onHandleIntent(android.content.Intent p5)
    {
        try {
            String v5_2 = this.getSharedPreferences("smc.safety.net.os.fingerprint", 0);
        } catch (Throwable) {
            com.sophos.smsec.core.smsectrace.d.c("SAFETYNET", "could not check OS version");
            String v5_4 = this.a();
            if ((com.google.android.gms.common.c.a().a(this) != 0) || (v5_4 == null)) {
                if (v5_4 != null) {
                    com.sophos.smsec.core.smsectrace.d.d("SAFETYNET", "could not start attestation, no Play Services");
                } else {
                    com.sophos.smsec.core.smsectrace.d.b("SAFETYNET", "SafetyNet attestation not possible, no network connection");
                }
            } else {
                String v5_8 = new byte[32];
                new java.security.SecureRandom().nextBytes(v5_8);
                String v5_9 = com.google.android.gms.safetynet.a.a(this).a(v5_8, "AIzaSyBogijzdGBhPn4f9akXW-hvCs-Ugz7aKAM");
                v5_9.a(this.a);
                v5_9.a(this.b);
            }
            return;
        }
        if (android.os.Build.FINGERPRINT.equals(v5_2.getString("smc.safety.net.os.fingerprint", ""))) {
        } else {
            com.sophos.smsec.core.smsectrace.d.b("SAFETYNET", "storing fingerprint");
            String v1_3 = com.google.firebase.database.FirebaseDatabase.getInstance().getReference("osVersions");
            v1_3.keepSynced(0);
            String v0_6 = v1_3.child(com.sophos.smsec.cloud.commands.SafetyNetCommandHandler.c(android.os.Build.MANUFACTURER)).child(com.sophos.smsec.cloud.commands.SafetyNetCommandHandler.c(android.os.Build.MODEL)).child(this.b());
            v0_6.child(com.sophos.cloud.core.device.d.f(this.getApplicationContext())).setValue(Long.valueOf(System.currentTimeMillis()));
            v0_6.push();
            String v5_3 = v5_2.edit();
            v5_3.putString("smc.safety.net.os.fingerprint", android.os.Build.FINGERPRINT);
            v5_3.putString("smc.safety.net.os.fingerprint+patch", this.b());
            v5_3.apply();
        }
    }

Method com.sophos.nge.networksec.certpinning.HttpsSecCheck.a() calling method java.security.SecureRandom.<init>()


    private void a(javax.net.ssl.HttpsURLConnection p6, java.util.List p7)
    {
        try {
            String v0_0 = com.sophos.nge.networksec.certpinning.c.a();
            com.sophos.nge.networksec.certpinning.b v1_3 = javax.net.ssl.SSLContext.getInstance("TLS");
            javax.net.ssl.TrustManager[] v3_1 = new javax.net.ssl.TrustManager[1];
            v3_1[0] = v0_0;
            v1_3.init(0, v3_1, new java.security.SecureRandom());
            p6.setSSLSocketFactory(v1_3.getSocketFactory());
            p6.setHostnameVerifier(com.sophos.nge.networksec.certpinning.b.a());
            v0_0.a(p7);
            com.sophos.nge.networksec.certpinning.b.a().b();
        } catch (Exception v6_2) {
            com.sophos.smsec.core.smsectrace.d.d("NGEHSC", "TLS init failed", v6_2);
        }
        return;
    }

Method com.sophos.keepasseditor.utils.f.a() calling method java.security.SecureRandom.<init>()


    public static String a(int p16, boolean p17, boolean p18, boolean p19, boolean p20, boolean p21, boolean p22, boolean p23, boolean p24)
    {
        if (p16 <= 0) {
            throw new com.sophos.keepasseditor.exceptions.PasswordLengthZeroException();
        } else {
            if ((!p17) && ((!p18) && ((!p19) && ((!p21) && ((!p22) && ((!p23) && ((!p20) && (!p24)))))))) {
                throw new com.sophos.keepasseditor.exceptions.NoItemsCheckedException();
            } else {
                String v9 = ark>com.sophos.keepasseditor.utils.fark>.a(p17, p18, p19, p21, p22, p23, p20, p24);
                String v1_2 = ark>com.sophos.keepasseditor.utils.fark>.a(0, 0, 0, p21, p22, p23, p20, p24);
                int v2_2 = v9.length();
                StringBuilder v3_3 = new StringBuilder();
                java.security.SecureRandom v4_2 = new java.security.SecureRandom();
                int v5_3 = (((p17 + p18) + p19) + p20);
                int v7_1 = 0;
                do {
                    int v8_0 = 0;
                    int v10_0 = 0;
                    int v11_0 = 0;
                    int v12_0 = 0;
                    int v13_0 = 0;
                    int v14 = 1;
                    if (v8_0 < p16) {
                        char v15_1 = v9.charAt(v4_2.nextInt(v2_2));
                        v3_3.append(v15_1);
                        if (p16 >= v5_3) {
                            if ((v10_0 == 0) && ("ABCDEFGHIJKLMNOPQRSTUVWXYZ".indexOf(v15_1) < 0)) {
                                v10_0 = 0;
                            } else {
                                v10_0 = 1;
                            }
                            if ((v11_0 == 0) && ("abcdefghijklmnopqrstuvwxyz".indexOf(v15_1) < 0)) {
                                v11_0 = 0;
                            } else {
                                v11_0 = 1;
                            }
                            if ((v12_0 == 0) && ("0123456789".indexOf(v15_1) < 0)) {
                                v12_0 = 0;
                            } else {
                                v12_0 = 1;
                            }
                            if ((v13_0 == 0) && (v1_2.indexOf(v15_1) < 0)) {
                                v14 = 0;
                            }
                            v13_0 = v14;
                        }
                        v8_0++;
                        while(true) {
                        }
                    }
                    int v8_2 = v3_3.toString();
                    if (p16 >= v5_3) {
                        if (((p17) && (v10_0 == 0)) || (((p18) && (v11_0 == 0)) || (((p19) && (v12_0 == 0)) || ((p20) && (v13_0 == 0))))) {
                            v14 = 0;
                        }
                        if (v14 != 0) {
                            v7_1 = v14;
                        } else {
                            v3_3 = new StringBuilder();
                            v7_1 = v14;
                        }
                    }
                } while((p16 >= v5_3) && (v7_1 == 0));
                return v8_2;
            }
        }
    }

Method com.sophos.keepasseditor.utils.d.<clinit>() calling method java.security.SecureRandom.<init>()


    static d()
    {
        com.sophos.keepasseditor.utils.d.a = new java.security.SecureRandom();
        return;
    }

Method com.nimbusds.jose.a.a.b() calling method java.security.SecureRandom.<init>()


    public java.security.SecureRandom b()
    {
        java.security.SecureRandom v0_0 = this.b;
        if (v0_0 == null) {
            v0_0 = new java.security.SecureRandom();
        }
        return v0_0;
    }

Method com.microsoft.aad.adal.StorageHelper.<init>() calling method java.security.SecureRandom.<init>()


    public StorageHelper(android.content.Context p2)
    {
        this.mKey = 0;
        this.mHMACKey = 0;
        this.mSecretKeyFromAndroidKeyStore = 0;
        this.mContext = p2;
        this.mRandom = new java.security.SecureRandom();
        return;
    }

Method com.microsoft.aad.adal.PRNGFixes.installLinuxPRNGSecureRandom() calling method java.security.SecureRandom.<init>()


    private static void installLinuxPRNGSecureRandom()
    {
        if (android.os.Build$VERSION.SDK_INT <= 18) {
            java.security.NoSuchAlgorithmException v0_16 = java.security.Security.getProviders("SecureRandom.SHA1PRNG");
            if ((v0_16 == null) || ((v0_16.length < 1) || (!com.microsoft.aad.adal.PRNGFixes$LinuxPRNGSecureRandomProvider.equals(v0_16[0].getClass())))) {
                com.microsoft.aad.adal.Logger.v("PRNGFixes:installLinuxPRNGSecureRandom", "Insert provider as LinuxPRNGSecureRandomProvider.");
                java.security.Security.insertProviderAt(new com.microsoft.aad.adal.PRNGFixes$LinuxPRNGSecureRandomProvider(), 1);
            }
            java.security.NoSuchAlgorithmException v0_8 = new java.security.SecureRandom();
            StringBuilder v3_2 = new StringBuilder();
            v3_2.append("Provider: ");
            v3_2.append(v0_8.getProvider().getClass().getName());
            com.microsoft.aad.adal.Logger.i("PRNGFixes:installLinuxPRNGSecureRandom", "LinuxPRNGSecureRandomProvider for SecureRandom. ", v3_2.toString());
            try {
                java.security.NoSuchAlgorithmException v0_15 = java.security.SecureRandom.getInstance("SHA1PRNG");
                StringBuilder v3_4 = new StringBuilder();
                v3_4.append("Provider: ");
                v3_4.append(v0_15.getProvider().getClass().getName());
                com.microsoft.aad.adal.Logger.i("PRNGFixes:installLinuxPRNGSecureRandom", "LinuxPRNGSecureRandomProvider for SecureRandom with alg SHA1PRNG. ", v3_4.toString());
                return;
            } catch (java.security.NoSuchAlgorithmException v0_21) {
                com.microsoft.aad.adal.Logger.v("PRNGFixes:installLinuxPRNGSecureRandom", "SHA1PRNG not available.");
                throw new SecurityException("SHA1PRNG not available", v0_21);
            }
        } else {
            com.microsoft.aad.adal.Logger.v("PRNGFixes:installLinuxPRNGSecureRandom", "No need to apply the fix.");
            return;
        }
    }

Method com.google.android.gms.measurement.internal.es.h() calling method java.security.SecureRandom.<init>()


    final java.security.SecureRandom h()
    {
        this.d();
        if (this.b == null) {
            this.b = new java.security.SecureRandom();
        }
        return this.b;
    }

Method com.google.android.gms.measurement.internal.es.f() calling method java.security.SecureRandom.<init>()


    protected final void f()
    {
        this.d();
        com.google.android.gms.measurement.internal.t v0_5 = new java.security.SecureRandom();
        long v1 = v0_5.nextLong();
        if (v1 == 0) {
            v1 = v0_5.nextLong();
            if (v1 == 0) {
                this.r().i().a("Utils falling back to Random for random id");
            }
        }
        this.c.set(v1);
        return;
    }