Info Call to Crypto API

Description

List of all calls to cryptographic methods.

Recommendation

Do not use insecure or weak cryptographic algorithms. For example, the Data Encryption Standard (DES) encryption algorithm is considered highly insecure

Do not use Object.equals() to compare cryptographic keys

Cryptographic keys should never be serialized

Technical details

Method com.google.android.gms.internal.zzcx.zzb() calling method javax.crypto.Cipher.doFinal()


    public final byte[] zzb(byte[] p6, String p7)
    {
        if (p6.length != 16) {
            throw new com.google.android.gms.internal.zzcy(this);
        } else {
            try {
                Throwable v7_20 = com.google.android.gms.internal.zzbv.zza(p7, 0);
            } catch (com.google.android.gms.internal.zzcy v6_11) {
                throw new com.google.android.gms.internal.zzcy(this, v6_11);
            } catch (com.google.android.gms.internal.zzcy v6_10) {
                throw new com.google.android.gms.internal.zzcy(this, v6_10);
            } catch (com.google.android.gms.internal.zzcy v6_9) {
                throw new com.google.android.gms.internal.zzcy(this, v6_9);
            } catch (com.google.android.gms.internal.zzcy v6_8) {
                throw new com.google.android.gms.internal.zzcy(this, v6_8);
            } catch (com.google.android.gms.internal.zzcy v6_7) {
                throw new com.google.android.gms.internal.zzcy(this, v6_7);
            } catch (com.google.android.gms.internal.zzcy v6_6) {
                throw new com.google.android.gms.internal.zzcy(this, v6_6);
            } catch (com.google.android.gms.internal.zzcy v6_5) {
                throw new com.google.android.gms.internal.zzcy(this, v6_5);
            }
            if (v7_20.length <= 16) {
                throw new com.google.android.gms.internal.zzcy(this);
            } else {
                javax.crypto.Cipher v0_2 = java.nio.ByteBuffer.allocate(v7_20.length);
                v0_2.put(v7_20);
                v0_2.flip();
                byte[] v2 = new byte[16];
                Throwable v7_3 = new byte[(v7_20.length - 16)];
                v0_2.get(v2);
                v0_2.get(v7_3);
                com.google.android.gms.internal.zzcx.getCipher().init(2, new javax.crypto.spec.SecretKeySpec(p6, "AES"), new javax.crypto.spec.IvParameterSpec(v2));
                return com.google.android.gms.internal.zzcx.getCipher().doFinal(v7_3);
            }
        }
    }

Method com.telemed.ae.manager.Encryptor.decrypt() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public static String decrypt(String p4)
    {
        try {
            String v0_4 = new javax.crypto.spec.IvParameterSpec(com.telemed.ae.manager.Encryptor.initVector.getBytes("UTF-8"));
            javax.crypto.spec.SecretKeySpec v1_1 = new javax.crypto.spec.SecretKeySpec(com.telemed.ae.manager.Encryptor.key.getBytes("UTF-8"), "AES");
            javax.crypto.Cipher v2_2 = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5PADDING");
            v2_2.init(2, v1_1, v0_4);
            return new String(v2_2.doFinal(android.util.Base64.decode(p4, 0)));
        } catch (int v4_3) {
            v4_3.printStackTrace();
            return 0;
        }
    }

Method com.telemed.ae.manager.Encryptor.encrypt() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public static String encrypt(String p4)
    {
        try {
            int v0_2 = new javax.crypto.spec.IvParameterSpec(com.telemed.ae.manager.Encryptor.initVector.getBytes("UTF-8"));
            javax.crypto.spec.SecretKeySpec v1_1 = new javax.crypto.spec.SecretKeySpec(com.telemed.ae.manager.Encryptor.key.getBytes("UTF-8"), "AES");
            javax.crypto.Cipher v2_2 = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5PADDING");
            v2_2.init(1, v1_1, v0_2);
            return android.util.Base64.encodeToString(v2_2.doFinal(p4.getBytes()), 0);
        } catch (int v4_4) {
            v4_4.printStackTrace();
            return 0;
        }
    }

Method org.apache.http.impl.auth.NTLMEngineImpl.RC4() calling method javax.crypto.spec.SecretKeySpec.<init>()


    static byte[] RC4(byte[] p4, byte[] p5)
    {
        try {
            String v0_2 = javax.crypto.Cipher.getInstance("RC4");
            v0_2.init(1, new javax.crypto.spec.SecretKeySpec(p5, "RC4"));
            return v0_2.doFinal(p4);
        } catch (Exception v4_1) {
            throw new org.apache.http.impl.auth.NTLMEngineException(v4_1.getMessage(), v4_1);
        }
    }

Method org.apache.http.impl.auth.NTLMEngineImpl.createDESKey() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private static java.security.Key createDESKey(byte[] p9, int p10)
    {
        byte[] v1 = new byte[7];
        int v2_1 = 0;
        System.arraycopy(p9, p10, v1, 0, 7);
        byte[] v9_2 = new byte[8];
        v9_2[v2_1] = v1[v2_1];
        v9_2[1] = ((byte) ((v1[0] << 7) | ((v1[1] & 255) >> 1)));
        v9_2[2] = ((byte) ((v1[1] << 6) | ((v1[2] & 255) >> 2)));
        v9_2[3] = ((byte) ((v1[2] << 5) | ((v1[3] & 255) >> 3)));
        v9_2[4] = ((byte) ((v1[3] << 4) | ((v1[int v7_3] & 255) >> 4)));
        v9_2[5] = ((byte) ((v1[4] << 3) | ((v1[int v5_3] & 255) >> 5)));
        v9_2[6] = ((byte) ((v1[5] << 2) | ((v1[int v3_3] & 255) >> 6)));
        v9_2[7] = ((byte) (v1[6] << 1));
        org.apache.http.impl.auth.NTLMEngineImpl.oddParity(v9_2);
        return new javax.crypto.spec.SecretKeySpec(v9_2, "DES");
    }

Method com.google.android.gms.internal.zzdxf.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public zzdxf(byte[] p3, int p4)
    {
        this.zzmkf = new javax.crypto.spec.SecretKeySpec(p3, "AES");
        this.zzmkh = ((javax.crypto.Cipher) com.google.android.gms.internal.zzdxx.zzmlk.zzoy("AES/CTR/NoPadding")).getBlockSize();
        if ((p4 < 12) || (p4 > this.zzmkh)) {
            throw new java.security.GeneralSecurityException("invalid IV size");
        } else {
            this.zzmkg = p4;
            return;
        }
    }

Method com.google.android.gms.internal.zzcx.zzb() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public final byte[] zzb(byte[] p6, String p7)
    {
        if (p6.length != 16) {
            throw new com.google.android.gms.internal.zzcy(this);
        } else {
            try {
                Throwable v7_20 = com.google.android.gms.internal.zzbv.zza(p7, 0);
            } catch (com.google.android.gms.internal.zzcy v6_11) {
                throw new com.google.android.gms.internal.zzcy(this, v6_11);
            } catch (com.google.android.gms.internal.zzcy v6_10) {
                throw new com.google.android.gms.internal.zzcy(this, v6_10);
            } catch (com.google.android.gms.internal.zzcy v6_9) {
                throw new com.google.android.gms.internal.zzcy(this, v6_9);
            } catch (com.google.android.gms.internal.zzcy v6_8) {
                throw new com.google.android.gms.internal.zzcy(this, v6_8);
            } catch (com.google.android.gms.internal.zzcy v6_7) {
                throw new com.google.android.gms.internal.zzcy(this, v6_7);
            } catch (com.google.android.gms.internal.zzcy v6_6) {
                throw new com.google.android.gms.internal.zzcy(this, v6_6);
            } catch (com.google.android.gms.internal.zzcy v6_5) {
                throw new com.google.android.gms.internal.zzcy(this, v6_5);
            }
            if (v7_20.length <= 16) {
                throw new com.google.android.gms.internal.zzcy(this);
            } else {
                javax.crypto.Cipher v0_2 = java.nio.ByteBuffer.allocate(v7_20.length);
                v0_2.put(v7_20);
                v0_2.flip();
                byte[] v2 = new byte[16];
                Throwable v7_3 = new byte[(v7_20.length - 16)];
                v0_2.get(v2);
                v0_2.get(v7_3);
                com.google.android.gms.internal.zzcx.getCipher().init(2, new javax.crypto.spec.SecretKeySpec(p6, "AES"), new javax.crypto.spec.IvParameterSpec(v2));
                return com.google.android.gms.internal.zzcx.getCipher().doFinal(v7_3);
            }
        }
    }

Method com.google.android.gms.internal.zzdgv.zza() calling method javax.crypto.spec.SecretKeySpec.<init>()

Couldn't retrieve source code

Method twitter4j.auth.OAuthAuthorization.generateSignature() calling method javax.crypto.spec.SecretKeySpec.<init>()


    String generateSignature(String p5, twitter4j.auth.OAuthToken p6)
    {
        try {
            javax.crypto.spec.SecretKeySpec v1_2;
            String v0_1 = javax.crypto.Mac.getInstance("HmacSHA1");
        } catch (String v5_2) {
            twitter4j.auth.OAuthAuthorization.logger.error("Failed initialize \"Message Authentication Code\" (MAC)", v5_2);
            throw new AssertionError(v5_2);
        } catch (String v5_1) {
            twitter4j.auth.OAuthAuthorization.logger.error("Failed to get HmacSHA1 \"Message Authentication Code\" (MAC)", v5_1);
            throw new AssertionError(v5_1);
        }
        if (p6 != null) {
            v1_2 = p6.getSecretKeySpec();
            if (v1_2 == null) {
                javax.crypto.spec.SecretKeySpec v1_8 = new StringBuilder();
                v1_8.append(twitter4j.HttpParameter.encode(this.consumerSecret));
                v1_8.append("&");
                v1_8.append(twitter4j.HttpParameter.encode(p6.getTokenSecret()));
                javax.crypto.spec.SecretKeySpec v2_5 = new javax.crypto.spec.SecretKeySpec(v1_8.toString().getBytes(), "HmacSHA1");
                p6.setSecretKeySpec(v2_5);
                v1_2 = v2_5;
            }
        } else {
            byte[] v6_2 = new StringBuilder();
            v6_2.append(twitter4j.HttpParameter.encode(this.consumerSecret));
            v6_2.append("&");
            v1_2 = new javax.crypto.spec.SecretKeySpec(v6_2.toString().getBytes(), "HmacSHA1");
        }
        v0_1.init(v1_2);
        return twitter4j.BASE64Encoder.encode(v0_1.doFinal(p5.getBytes()));
    }

Method com.google.android.gms.internal.zzdui.zza() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public final synthetic Object zza(com.google.android.gms.internal.zzfjc p5)
    {
        if (!(p5 instanceof com.google.android.gms.internal.zzdwa)) {
            throw new java.security.GeneralSecurityException("expected HmacKey proto");
        } else {
            com.google.android.gms.internal.zzdyp.zzw(((com.google.android.gms.internal.zzdwa) p5).getVersion(), 0);
            if (((com.google.android.gms.internal.zzdwa) p5).zzbot().size() < 16) {
                throw new java.security.GeneralSecurityException("key too short");
            } else {
                com.google.android.gms.internal.zzdui.zza(((com.google.android.gms.internal.zzdwa) p5).zzbqk());
                com.google.android.gms.internal.zzdyj v0_6 = ((com.google.android.gms.internal.zzdwa) p5).zzbqk().zzbqq();
                javax.crypto.spec.SecretKeySpec v2_1 = new javax.crypto.spec.SecretKeySpec(((com.google.android.gms.internal.zzdwa) p5).zzbot().toByteArray(), "HMAC");
                java.security.GeneralSecurityException v5_5 = ((com.google.android.gms.internal.zzdwa) p5).zzbqk().zzbqr();
                switch (com.google.android.gms.internal.zzduj.zzmfk[v0_6.ordinal()]) {
                    case 1:
                        return new com.google.android.gms.internal.zzdyj("HMACSHA1", v2_1, v5_5);
                    case 2:
                        return new com.google.android.gms.internal.zzdyj("HMACSHA256", v2_1, v5_5);
                    case 3:
                        return new com.google.android.gms.internal.zzdyj("HMACSHA512", v2_1, v5_5);
                    default:
                        throw new java.security.GeneralSecurityException("unknown hash");
                }
            }
        }
    }

Method com.google.android.gms.internal.zzcx.zzc() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public final String zzc(byte[] p5, byte[] p6)
    {
        if (p5.length != 16) {
            throw new com.google.android.gms.internal.zzcy(this);
        } else {
            try {
            } catch (String v5_11) {
                throw new com.google.android.gms.internal.zzcy(this, v5_11);
            } catch (String v5_10) {
                throw new com.google.android.gms.internal.zzcy(this, v5_10);
            } catch (String v5_9) {
                throw new com.google.android.gms.internal.zzcy(this, v5_9);
            } catch (String v5_8) {
                throw new com.google.android.gms.internal.zzcy(this, v5_8);
            } catch (String v5_7) {
                throw new com.google.android.gms.internal.zzcy(this, v5_7);
            }
            com.google.android.gms.internal.zzcx.getCipher().init(1, new javax.crypto.spec.SecretKeySpec(p5, "AES"), 0);
            int v6_1 = com.google.android.gms.internal.zzcx.getCipher().doFinal(p6);
            java.nio.ByteBuffer v0_3 = com.google.android.gms.internal.zzcx.getCipher().getIV();
            String v5_2 = (v6_1.length + v0_3.length);
            java.nio.ByteBuffer v1_3 = java.nio.ByteBuffer.allocate(v5_2);
            v1_3.put(v0_3).put(v6_1);
            v1_3.flip();
            String v5_4 = new byte[v5_2];
            v1_3.get(v5_4);
            return com.google.android.gms.internal.zzbv.zza(v5_4, 0);
        }
    }

Method com.google.android.gms.internal.zzdyg.zza() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public static byte[] zza(String p4, byte[] p5, byte[] p6, byte[] p7, int p8)
    {
        javax.crypto.Mac v0_2 = ((javax.crypto.Mac) com.google.android.gms.internal.zzdxx.zzmll.zzoy(p4));
        if (p8 > (v0_2.getMacLength() * 255)) {
            throw new java.security.GeneralSecurityException("size too large");
        } else {
            if ((p6 != null) && (p6.length != 0)) {
                v0_2.init(new javax.crypto.spec.SecretKeySpec(p6, p4));
            } else {
                int v1_4 = new byte[v0_2.getMacLength()];
                v0_2.init(new javax.crypto.spec.SecretKeySpec(v1_4, p4));
            }
            byte[] v6_3 = new byte[p8];
            v0_2.init(new javax.crypto.spec.SecretKeySpec(v0_2.doFinal(p5), p4));
            byte[] v5_2 = new byte[0];
            int v1_7 = 1;
            int v2 = 0;
            while(true) {
                v0_2.update(v5_2);
                v0_2.update(p7);
                v0_2.update(((byte) v1_7));
                v5_2 = v0_2.doFinal();
                if ((v5_2.length + v2) >= p8) {
                    break;
                }
                System.arraycopy(v5_2, 0, v6_3, v2, v5_2.length);
                v2 += v5_2.length;
                v1_7++;
            }
            System.arraycopy(v5_2, 0, v6_3, v2, (p8 - v2));
            return v6_3;
        }
    }

Method com.google.android.gms.internal.zzdui.zzh() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private final com.google.android.gms.internal.zzdtj zzh(com.google.android.gms.internal.zzfgs p5)
    {
        try {
            java.security.GeneralSecurityException v5_1 = com.google.android.gms.internal.zzdwa.zzae(p5);
        } catch (java.security.GeneralSecurityException v5_10) {
            throw new java.security.GeneralSecurityException("expected serialized HmacKey proto", v5_10);
        }
        if (!(v5_1 instanceof com.google.android.gms.internal.zzdwa)) {
            throw new java.security.GeneralSecurityException("expected HmacKey proto");
        } else {
            java.security.GeneralSecurityException v5_11 = ((com.google.android.gms.internal.zzdwa) v5_1);
            com.google.android.gms.internal.zzdyp.zzw(v5_11.getVersion(), 0);
            if (v5_11.zzbot().size() < 16) {
                throw new java.security.GeneralSecurityException("key too short");
            } else {
                com.google.android.gms.internal.zzdtj v0_11;
                com.google.android.gms.internal.zzdui.zza(v5_11.zzbqk());
                com.google.android.gms.internal.zzdtj v0_7 = v5_11.zzbqk().zzbqq();
                javax.crypto.spec.SecretKeySpec v2_1 = new javax.crypto.spec.SecretKeySpec(v5_11.zzbot().toByteArray(), "HMAC");
                java.security.GeneralSecurityException v5_6 = v5_11.zzbqk().zzbqr();
                switch (com.google.android.gms.internal.zzduj.zzmfk[v0_7.ordinal()]) {
                    case 1:
                        v0_11 = new com.google.android.gms.internal.zzdyj("HMACSHA1", v2_1, v5_6);
                        break;
                    case 2:
                        v0_11 = new com.google.android.gms.internal.zzdyj("HMACSHA256", v2_1, v5_6);
                        break;
                    case 3:
                        v0_11 = new com.google.android.gms.internal.zzdyj("HMACSHA512", v2_1, v5_6);
                        break;
                    default:
                        throw new java.security.GeneralSecurityException("unknown hash");
                }
                return ((com.google.android.gms.internal.zzdtj) v0_11);
            }
        }
    }

Method com.google.android.gms.internal.zzdxg.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public zzdxg(byte[] p3, int p4)
    {
        if ((p4 != 12) && (p4 != 16)) {
            throw new IllegalArgumentException("IV size should be either 12 or 16 bytes");
        } else {
            this.zzmkk = p4;
            this.zzmkf = new javax.crypto.spec.SecretKeySpec(p3, "AES");
            IllegalArgumentException v3_2 = javax.crypto.Cipher.getInstance("AES/ECB/NOPADDING");
            v3_2.init(1, this.zzmkf);
            String v4_4 = new byte[16];
            this.zzmki = com.google.android.gms.internal.zzdxg.zzak(v3_2.doFinal(v4_4));
            this.zzmkj = com.google.android.gms.internal.zzdxg.zzak(this.zzmki);
            return;
        }
    }

Method com.google.android.gms.internal.zzdxh.<init>() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public zzdxh(byte[] p3)
    {
        this.zzmkl = new javax.crypto.spec.SecretKeySpec(p3, "AES");
        return;
    }

Method cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.RC4() calling method javax.crypto.spec.SecretKeySpec.<init>()


    static byte[] RC4(byte[] p4, byte[] p5)
    {
        try {
            String v0_2 = javax.crypto.Cipher.getInstance("RC4");
            v0_2.init(1, new javax.crypto.spec.SecretKeySpec(p5, "RC4"));
            return v0_2.doFinal(p4);
        } catch (Exception v4_1) {
            throw new cz.msebera.android.httpclient.impl.auth.NTLMEngineException(v4_1.getMessage(), v4_1);
        }
    }

Method cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.createDESKey() calling method javax.crypto.spec.SecretKeySpec.<init>()


    private static java.security.Key createDESKey(byte[] p9, int p10)
    {
        byte[] v1 = new byte[7];
        int v2_1 = 0;
        System.arraycopy(p9, p10, v1, 0, 7);
        byte[] v9_2 = new byte[8];
        v9_2[v2_1] = v1[v2_1];
        v9_2[1] = ((byte) ((v1[0] << 7) | ((v1[1] & 255) >> 1)));
        v9_2[2] = ((byte) ((v1[1] << 6) | ((v1[2] & 255) >> 2)));
        v9_2[3] = ((byte) ((v1[2] << 5) | ((v1[3] & 255) >> 3)));
        v9_2[4] = ((byte) ((v1[3] << 4) | ((v1[int v7_3] & 255) >> 4)));
        v9_2[5] = ((byte) ((v1[4] << 3) | ((v1[int v5_3] & 255) >> 5)));
        v9_2[6] = ((byte) ((v1[5] << 2) | ((v1[int v3_3] & 255) >> 6)));
        v9_2[7] = ((byte) (v1[6] << 1));
        cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.oddParity(v9_2);
        return new javax.crypto.spec.SecretKeySpec(v9_2, "DES");
    }

Method oauth.signpost.signature.HmacSha1MessageSigner.sign() calling method javax.crypto.spec.SecretKeySpec.<init>()


    public String sign(oauth.signpost.http.HttpRequest p4, oauth.signpost.http.HttpParameters p5)
    {
        try {
            javax.crypto.Mac v0_1 = new StringBuilder();
            v0_1.append(oauth.signpost.OAuth.percentEncode(this.getConsumerSecret()));
            v0_1.append(38);
            v0_1.append(oauth.signpost.OAuth.percentEncode(this.getTokenSecret()));
            oauth.signpost.signature.SignatureBaseString v1_4 = new javax.crypto.spec.SecretKeySpec(v0_1.toString().getBytes("UTF-8"), "HmacSHA1");
            javax.crypto.Mac v0_5 = javax.crypto.Mac.getInstance("HmacSHA1");
            v0_5.init(v1_4);
            java.io.UnsupportedEncodingException v4_1 = new oauth.signpost.signature.SignatureBaseString(p4, p5).generate();
            oauth.signpost.OAuth.debugOut("SBS", v4_1);
            return this.base64Encode(v0_5.doFinal(v4_1.getBytes("UTF-8"))).trim();
        } catch (java.io.UnsupportedEncodingException v4_7) {
            throw new oauth.signpost.exception.OAuthMessageSignerException(v4_7);
        } catch (java.io.UnsupportedEncodingException v4_6) {
            throw new oauth.signpost.exception.OAuthMessageSignerException(v4_6);
        }
    }

Method com.google.android.gms.internal.zzcx.zzc() calling method javax.crypto.Cipher.doFinal()


    public final String zzc(byte[] p5, byte[] p6)
    {
        if (p5.length != 16) {
            throw new com.google.android.gms.internal.zzcy(this);
        } else {
            try {
            } catch (String v5_11) {
                throw new com.google.android.gms.internal.zzcy(this, v5_11);
            } catch (String v5_10) {
                throw new com.google.android.gms.internal.zzcy(this, v5_10);
            } catch (String v5_9) {
                throw new com.google.android.gms.internal.zzcy(this, v5_9);
            } catch (String v5_8) {
                throw new com.google.android.gms.internal.zzcy(this, v5_8);
            } catch (String v5_7) {
                throw new com.google.android.gms.internal.zzcy(this, v5_7);
            }
            com.google.android.gms.internal.zzcx.getCipher().init(1, new javax.crypto.spec.SecretKeySpec(p5, "AES"), 0);
            int v6_1 = com.google.android.gms.internal.zzcx.getCipher().doFinal(p6);
            java.nio.ByteBuffer v0_3 = com.google.android.gms.internal.zzcx.getCipher().getIV();
            String v5_2 = (v6_1.length + v0_3.length);
            java.nio.ByteBuffer v1_3 = java.nio.ByteBuffer.allocate(v5_2);
            v1_3.put(v0_3).put(v6_1);
            v1_3.flip();
            String v5_4 = new byte[v5_2];
            v1_3.get(v5_4);
            return com.google.android.gms.internal.zzbv.zza(v5_4, 0);
        }
    }

Method com.telemed.ae.manager.Encryptor.decrypt() calling method javax.crypto.Cipher.doFinal()


    public static String decrypt(String p4)
    {
        try {
            String v0_4 = new javax.crypto.spec.IvParameterSpec(com.telemed.ae.manager.Encryptor.initVector.getBytes("UTF-8"));
            javax.crypto.spec.SecretKeySpec v1_1 = new javax.crypto.spec.SecretKeySpec(com.telemed.ae.manager.Encryptor.key.getBytes("UTF-8"), "AES");
            javax.crypto.Cipher v2_2 = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5PADDING");
            v2_2.init(2, v1_1, v0_4);
            return new String(v2_2.doFinal(android.util.Base64.decode(p4, 0)));
        } catch (int v4_3) {
            v4_3.printStackTrace();
            return 0;
        }
    }

Method com.telemed.ae.manager.Encryptor.encrypt() calling method javax.crypto.Cipher.doFinal()


    public static String encrypt(String p4)
    {
        try {
            int v0_2 = new javax.crypto.spec.IvParameterSpec(com.telemed.ae.manager.Encryptor.initVector.getBytes("UTF-8"));
            javax.crypto.spec.SecretKeySpec v1_1 = new javax.crypto.spec.SecretKeySpec(com.telemed.ae.manager.Encryptor.key.getBytes("UTF-8"), "AES");
            javax.crypto.Cipher v2_2 = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5PADDING");
            v2_2.init(1, v1_1, v0_2);
            return android.util.Base64.encodeToString(v2_2.doFinal(p4.getBytes()), 0);
        } catch (int v4_4) {
            v4_4.printStackTrace();
            return 0;
        }
    }

Method cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl$CipherGen.getLanManagerSessionKey() calling method javax.crypto.Cipher.doFinal()


    public byte[] getLanManagerSessionKey()
    {
        if (this.lanManagerSessionKey == null) {
            try {
                Exception v0_3 = new byte[14];
                System.arraycopy(this.getLMHash(), 0, v0_3, 0, 8);
                java.util.Arrays.fill(v0_3, 8, v0_3.length, -67);
                cz.msebera.android.httpclient.impl.auth.NTLMEngineException v1_0 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.access$900(v0_3, 0);
                Exception v0_1 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.access$900(v0_3, 7);
                String v2_0 = new byte[8];
                System.arraycopy(this.getLMResponse(), 0, v2_0, 0, v2_0.length);
                int v4_4 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
                v4_4.init(1, v1_0);
                cz.msebera.android.httpclient.impl.auth.NTLMEngineException v1_1 = v4_4.doFinal(v2_0);
                int v4_6 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
                v4_6.init(1, v0_1);
                Exception v0_4 = v4_6.doFinal(v2_0);
                String v2_2 = new byte[16];
                this.lanManagerSessionKey = v2_2;
                System.arraycopy(v1_1, 0, this.lanManagerSessionKey, 0, v1_1.length);
                System.arraycopy(v0_4, 0, this.lanManagerSessionKey, v1_1.length, v0_4.length);
            } catch (Exception v0_5) {
                throw new cz.msebera.android.httpclient.impl.auth.NTLMEngineException(v0_5.getMessage(), v0_5);
            }
        }
        return this.lanManagerSessionKey;
    }

Method org.apache.http.impl.auth.NTLMEngineImpl$CipherGen.getLanManagerSessionKey() calling method javax.crypto.Cipher.doFinal()


    public byte[] getLanManagerSessionKey()
    {
        if (this.lanManagerSessionKey == null) {
            try {
                Exception v0_3 = new byte[14];
                System.arraycopy(this.getLMHash(), 0, v0_3, 0, 8);
                java.util.Arrays.fill(v0_3, 8, v0_3.length, -67);
                org.apache.http.impl.auth.NTLMEngineException v1_0 = org.apache.http.impl.auth.NTLMEngineImpl.access$900(v0_3, 0);
                Exception v0_1 = org.apache.http.impl.auth.NTLMEngineImpl.access$900(v0_3, 7);
                String v2_0 = new byte[8];
                System.arraycopy(this.getLMResponse(), 0, v2_0, 0, v2_0.length);
                int v4_4 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
                v4_4.init(1, v1_0);
                org.apache.http.impl.auth.NTLMEngineException v1_1 = v4_4.doFinal(v2_0);
                int v4_6 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
                v4_6.init(1, v0_1);
                Exception v0_4 = v4_6.doFinal(v2_0);
                String v2_2 = new byte[16];
                this.lanManagerSessionKey = v2_2;
                System.arraycopy(v1_1, 0, this.lanManagerSessionKey, 0, v1_1.length);
                System.arraycopy(v0_4, 0, this.lanManagerSessionKey, v1_1.length, v0_4.length);
            } catch (Exception v0_5) {
                throw new org.apache.http.impl.auth.NTLMEngineException(v0_5.getMessage(), v0_5);
            }
        }
        return this.lanManagerSessionKey;
    }

Method org.apache.http.impl.auth.NTLMEngineImpl.RC4() calling method javax.crypto.Cipher.doFinal()


    static byte[] RC4(byte[] p4, byte[] p5)
    {
        try {
            String v0_2 = javax.crypto.Cipher.getInstance("RC4");
            v0_2.init(1, new javax.crypto.spec.SecretKeySpec(p5, "RC4"));
            return v0_2.doFinal(p4);
        } catch (Exception v4_1) {
            throw new org.apache.http.impl.auth.NTLMEngineException(v4_1.getMessage(), v4_1);
        }
    }

Method com.telemed.ae.manager.Encryptor.encrypt() calling method javax.crypto.Cipher.getInstance()


    public static String encrypt(String p4)
    {
        try {
            int v0_2 = new javax.crypto.spec.IvParameterSpec(com.telemed.ae.manager.Encryptor.initVector.getBytes("UTF-8"));
            javax.crypto.spec.SecretKeySpec v1_1 = new javax.crypto.spec.SecretKeySpec(com.telemed.ae.manager.Encryptor.key.getBytes("UTF-8"), "AES");
            javax.crypto.Cipher v2_2 = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5PADDING");
            v2_2.init(1, v1_1, v0_2);
            return android.util.Base64.encodeToString(v2_2.doFinal(p4.getBytes()), 0);
        } catch (int v4_4) {
            v4_4.printStackTrace();
            return 0;
        }
    }

Method org.apache.http.impl.auth.NTLMEngineImpl.lmHash() calling method javax.crypto.Cipher.doFinal()


    private static byte[] lmHash(String p5)
    {
        try {
            Exception v5_5 = p5.toUpperCase(java.util.Locale.ENGLISH).getBytes("US-ASCII");
            String v1_0 = new byte[14];
            System.arraycopy(v5_5, 0, v1_0, 0, Math.min(v5_5.length, 14));
            Exception v5_1 = org.apache.http.impl.auth.NTLMEngineImpl.createDESKey(v1_0, 0);
            org.apache.http.impl.auth.NTLMEngineException v0_2 = org.apache.http.impl.auth.NTLMEngineImpl.createDESKey(v1_0, 7);
            String v1_2 = "KGS!@#$%".getBytes("US-ASCII");
            int v3_2 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
            v3_2.init(1, v5_1);
            Exception v5_3 = v3_2.doFinal(v1_2);
            v3_2.init(1, v0_2);
            org.apache.http.impl.auth.NTLMEngineException v0_4 = v3_2.doFinal(v1_2);
            String v1_4 = new byte[16];
            System.arraycopy(v5_3, 0, v1_4, 0, 8);
            System.arraycopy(v0_4, 0, v1_4, 8, 8);
            return v1_4;
        } catch (Exception v5_4) {
            throw new org.apache.http.impl.auth.NTLMEngineException(v5_4.getMessage(), v5_4);
        }
    }

Method org.apache.http.impl.auth.NTLMEngineImpl.lmResponse() calling method javax.crypto.Cipher.doFinal()


    private static byte[] lmResponse(byte[] p6, byte[] p7)
    {
        try {
            String v0_1 = new byte[21];
            System.arraycopy(p6, 0, v0_1, 0, 16);
            Exception v6_3 = org.apache.http.impl.auth.NTLMEngineImpl.createDESKey(v0_1, 0);
            byte[] v3_2 = org.apache.http.impl.auth.NTLMEngineImpl.createDESKey(v0_1, 7);
            String v0_2 = org.apache.http.impl.auth.NTLMEngineImpl.createDESKey(v0_1, 14);
            int v4_2 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
            v4_2.init(1, v6_3);
            Exception v6_1 = v4_2.doFinal(p7);
            v4_2.init(1, v3_2);
            byte[] v3_0 = v4_2.doFinal(p7);
            v4_2.init(1, v0_2);
            org.apache.http.impl.auth.NTLMEngineException v7_1 = v4_2.doFinal(p7);
            String v0_4 = new byte[24];
            System.arraycopy(v6_1, 0, v0_4, 0, 8);
            System.arraycopy(v3_0, 0, v0_4, 8, 8);
            System.arraycopy(v7_1, 0, v0_4, 16, 8);
            return v0_4;
        } catch (Exception v6_2) {
            throw new org.apache.http.impl.auth.NTLMEngineException(v6_2.getMessage(), v6_2);
        }
    }

Method com.google.android.gms.internal.zzdxf.zzaj() calling method javax.crypto.Cipher.doFinal()


    public final byte[] zzaj(byte[] p9)
    {
        if (p9.length > (2147483647 - this.zzmkg)) {
            int v2_6 = (2147483647 - this.zzmkg);
            StringBuilder v1_1 = new StringBuilder(43);
            v1_1.append("plaintext length can not exceed ");
            v1_1.append(v2_6);
            throw new java.security.GeneralSecurityException(v1_1.toString());
        } else {
            String v0_5 = new byte[(this.zzmkg + p9.length)];
            StringBuilder v1_4 = com.google.android.gms.internal.zzdyl.zzgy(this.zzmkg);
            System.arraycopy(v1_4, 0, v0_5, 0, this.zzmkg);
            int v7 = p9.length;
            int v6 = this.zzmkg;
            int v2_4 = ((javax.crypto.Cipher) com.google.android.gms.internal.zzdxx.zzmlk.zzoy("AES/CTR/NoPadding"));
            int v4_2 = new byte[this.zzmkh];
            System.arraycopy(v1_4, 0, v4_2, 0, this.zzmkg);
            v2_4.init(1, this.zzmkf, new javax.crypto.spec.IvParameterSpec(v4_2));
            if (v2_4.doFinal(p9, 0, v7, v0_5, v6) != v7) {
                throw new java.security.GeneralSecurityException("stored output\'s length does not match input\'s length");
            } else {
                return v0_5;
            }
        }
    }

Method com.google.android.gms.internal.zzdxg.<init>() calling method javax.crypto.Cipher.doFinal()


    public zzdxg(byte[] p3, int p4)
    {
        if ((p4 != 12) && (p4 != 16)) {
            throw new IllegalArgumentException("IV size should be either 12 or 16 bytes");
        } else {
            this.zzmkk = p4;
            this.zzmkf = new javax.crypto.spec.SecretKeySpec(p3, "AES");
            IllegalArgumentException v3_2 = javax.crypto.Cipher.getInstance("AES/ECB/NOPADDING");
            v3_2.init(1, this.zzmkf);
            String v4_4 = new byte[16];
            this.zzmki = com.google.android.gms.internal.zzdxg.zzak(v3_2.doFinal(v4_4));
            this.zzmkj = com.google.android.gms.internal.zzdxg.zzak(this.zzmki);
            return;
        }
    }

Method com.telemed.ae.ui.common.adapter.PreHomeScreenAdapter.cipherInit() calling method javax.crypto.Cipher.getInstance()


    public boolean cipherInit()
    {
        try {
            this.cipher = javax.crypto.Cipher.getInstance("AES/CBC/PKCS7Padding");
            try {
                this.keyStore.load(0);
                this.cipher.init(1, ((javax.crypto.SecretKey) this.keyStore.getKey("adtc", 0)));
                return 1;
            } catch (android.security.keystore.KeyPermanentlyInvalidatedException) {
                return 0;
            } catch (java.security.KeyStoreException v0_5) {
                throw new RuntimeException("Failed to init Cipher", v0_5);
            }
        } catch (java.security.KeyStoreException v0_7) {
            throw new RuntimeException("Failed to get Cipher", v0_7);
        }
        this.keyStore.load(0);
        this.cipher.init(1, ((javax.crypto.SecretKey) this.keyStore.getKey("adtc", 0)));
        return 1;
    }

Method com.google.android.gms.internal.zzdxg.zza() calling method javax.crypto.Cipher.doFinal()


    private final byte[] zza(javax.crypto.Cipher p7, int p8, byte[] p9, int p10, int p11)
    {
        byte[] v8_10;
        int v1_0 = new byte[16];
        v1_0[15] = ((byte) p8);
        if (p11 != 0) {
            int v1_1 = 0;
            byte[] v2_1 = p7.doFinal(v1_0);
            byte[] v8_1 = 0;
            while ((p11 - v8_1) > 16) {
                int v3_1 = 0;
                while (v3_1 < 16) {
                    v2_1[v3_1] = ((byte) (v2_1[v3_1] ^ p9[((p10 + v8_1) + v3_1)]));
                    v3_1++;
                }
                v2_1 = p7.doFinal(v2_1);
                v8_1 += 16;
            }
            byte[] v8_9;
            byte[] v8_3 = java.util.Arrays.copyOfRange(p9, (v8_1 + p10), (p10 + p11));
            if (v8_3.length != 16) {
                byte[] v9_3 = java.util.Arrays.copyOf(this.zzmkj, 16);
                while (v1_1 < v8_3.length) {
                    v9_3[v1_1] = ((byte) (v9_3[v1_1] ^ v8_3[v1_1]));
                    v1_1++;
                }
                v9_3[v8_3.length] = ((byte) (v9_3[v8_3.length] ^ 128));
                v8_9 = v9_3;
            } else {
                v8_9 = com.google.android.gms.internal.zzdxg.zze(v8_3, this.zzmki);
            }
            v8_10 = com.google.android.gms.internal.zzdxg.zze(v2_1, v8_9);
        } else {
            v8_10 = com.google.android.gms.internal.zzdxg.zze(v1_0, this.zzmki);
        }
        return p7.doFinal(v8_10);
    }

Method com.google.android.gms.internal.zzdxg.zzd() calling method javax.crypto.Cipher.doFinal()


    public final byte[] zzd(byte[] p16, byte[] p17)
    {
        if (p16.length > ((2147483647 - this.zzmkk) - 16)) {
            throw new java.security.GeneralSecurityException("plaintext too long");
        } else {
            byte[] v9 = new byte[((this.zzmkk + p16.length) + 16)];
            byte v3_0 = com.google.android.gms.internal.zzdyl.zzgy(this.zzmkk);
            int v10 = 0;
            System.arraycopy(v3_0, 0, v9, 0, this.zzmkk);
            javax.crypto.Cipher v11 = javax.crypto.Cipher.getInstance("AES/ECB/NOPADDING");
            v11.init(1, this.zzmkf);
            String v1_3 = v11;
            byte[] v13 = this.zza(v1_3, 0, v3_0, 0, v3_0.length);
            byte[] v14 = this.zza(v1_3, 1, p17, 0, p17.length);
            java.security.GeneralSecurityException v0_11 = javax.crypto.Cipher.getInstance("AES/CTR/NOPADDING");
            v0_11.init(1, this.zzmkf, new javax.crypto.spec.IvParameterSpec(v13));
            v0_11.doFinal(p16, 0, p16.length, v9, this.zzmkk);
            java.security.GeneralSecurityException v0_13 = this.zza(v11, 2, v9, this.zzmkk, p16.length);
            while (v10 < 16) {
                v9[((p16.length + this.zzmkk) + v10)] = ((byte) ((v14[v10] ^ v13[v10]) ^ v0_13[v10]));
                v10++;
            }
            return v9;
        }
    }

Method com.google.android.gms.internal.zzdxh.zzd() calling method javax.crypto.Cipher.doFinal()


    public final byte[] zzd(byte[] p9, byte[] p10)
    {
        if (p9.length > 2147483619) {
            throw new java.security.GeneralSecurityException("plaintext too long");
        } else {
            byte[] v0_2 = new byte[((p9.length + 12) + 16)];
            javax.crypto.Cipher v2_0 = com.google.android.gms.internal.zzdyl.zzgy(12);
            System.arraycopy(v2_0, 0, v0_2, 0, 12);
            javax.crypto.Cipher v1_3 = ((javax.crypto.Cipher) com.google.android.gms.internal.zzdxx.zzmlk.zzoy("AES/GCM/NoPadding"));
            v1_3.init(1, this.zzmkl, new javax.crypto.spec.GCMParameterSpec(128, v2_0));
            v1_3.updateAAD(p10);
            v1_3.doFinal(p9, 0, p9.length, v0_2, 12);
            return v0_2;
        }
    }

Method cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.RC4() calling method javax.crypto.Cipher.doFinal()


    static byte[] RC4(byte[] p4, byte[] p5)
    {
        try {
            String v0_2 = javax.crypto.Cipher.getInstance("RC4");
            v0_2.init(1, new javax.crypto.spec.SecretKeySpec(p5, "RC4"));
            return v0_2.doFinal(p4);
        } catch (Exception v4_1) {
            throw new cz.msebera.android.httpclient.impl.auth.NTLMEngineException(v4_1.getMessage(), v4_1);
        }
    }

Method cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.lmHash() calling method javax.crypto.Cipher.doFinal()


    private static byte[] lmHash(String p5)
    {
        try {
            Exception v5_5 = p5.toUpperCase(java.util.Locale.ENGLISH).getBytes("US-ASCII");
            String v1_0 = new byte[14];
            System.arraycopy(v5_5, 0, v1_0, 0, Math.min(v5_5.length, 14));
            Exception v5_1 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.createDESKey(v1_0, 0);
            cz.msebera.android.httpclient.impl.auth.NTLMEngineException v0_2 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.createDESKey(v1_0, 7);
            String v1_2 = "KGS!@#$%".getBytes("US-ASCII");
            int v3_2 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
            v3_2.init(1, v5_1);
            Exception v5_3 = v3_2.doFinal(v1_2);
            v3_2.init(1, v0_2);
            cz.msebera.android.httpclient.impl.auth.NTLMEngineException v0_4 = v3_2.doFinal(v1_2);
            String v1_4 = new byte[16];
            System.arraycopy(v5_3, 0, v1_4, 0, 8);
            System.arraycopy(v0_4, 0, v1_4, 8, 8);
            return v1_4;
        } catch (Exception v5_4) {
            throw new cz.msebera.android.httpclient.impl.auth.NTLMEngineException(v5_4.getMessage(), v5_4);
        }
    }

Method cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.lmResponse() calling method javax.crypto.Cipher.doFinal()


    private static byte[] lmResponse(byte[] p6, byte[] p7)
    {
        try {
            String v0_1 = new byte[21];
            System.arraycopy(p6, 0, v0_1, 0, 16);
            Exception v6_3 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.createDESKey(v0_1, 0);
            byte[] v3_2 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.createDESKey(v0_1, 7);
            String v0_2 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.createDESKey(v0_1, 14);
            int v4_2 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
            v4_2.init(1, v6_3);
            Exception v6_1 = v4_2.doFinal(p7);
            v4_2.init(1, v3_2);
            byte[] v3_0 = v4_2.doFinal(p7);
            v4_2.init(1, v0_2);
            cz.msebera.android.httpclient.impl.auth.NTLMEngineException v7_1 = v4_2.doFinal(p7);
            String v0_4 = new byte[24];
            System.arraycopy(v6_1, 0, v0_4, 0, 8);
            System.arraycopy(v3_0, 0, v0_4, 8, 8);
            System.arraycopy(v7_1, 0, v0_4, 16, 8);
            return v0_4;
        } catch (Exception v6_2) {
            throw new cz.msebera.android.httpclient.impl.auth.NTLMEngineException(v6_2.getMessage(), v6_2);
        }
    }

Method com.telemed.ae.manager.Encryptor.decrypt() calling method javax.crypto.Cipher.getInstance()


    public static String decrypt(String p4)
    {
        try {
            String v0_4 = new javax.crypto.spec.IvParameterSpec(com.telemed.ae.manager.Encryptor.initVector.getBytes("UTF-8"));
            javax.crypto.spec.SecretKeySpec v1_1 = new javax.crypto.spec.SecretKeySpec(com.telemed.ae.manager.Encryptor.key.getBytes("UTF-8"), "AES");
            javax.crypto.Cipher v2_2 = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5PADDING");
            v2_2.init(2, v1_1, v0_4);
            return new String(v2_2.doFinal(android.util.Base64.decode(p4, 0)));
        } catch (int v4_3) {
            v4_3.printStackTrace();
            return 0;
        }
    }

Method com.google.android.gms.internal.zzdgv.zza() calling method javax.crypto.Cipher.doFinal()


    private static String zza(javax.crypto.Cipher p1, String p2, javax.crypto.spec.SecretKeySpec p3, javax.crypto.spec.IvParameterSpec p4)
    {
        if ((p2 == null) || (p2.length() == 0)) {
            throw new RuntimeException("Encrypt: empty input string");
        } else {
            try {
                p1.init(1, p3, p4);
                return com.google.android.gms.internal.zzczf.zzj(p1.doFinal(p2.getBytes()));
            } catch (String v1_3) {
                String v1_5 = String.valueOf(v1_3.getMessage());
                if (v1_5.length() == 0) {
                    String v1_7 = new String("Encrypt: ");
                } else {
                    v1_7 = "Encrypt: ".concat(v1_5);
                }
                throw new RuntimeException(v1_7);
            }
        }
    }

Method com.google.android.gms.internal.zzcx.zzc() calling method javax.crypto.Cipher.getIV()


    public final String zzc(byte[] p5, byte[] p6)
    {
        if (p5.length != 16) {
            throw new com.google.android.gms.internal.zzcy(this);
        } else {
            try {
            } catch (String v5_11) {
                throw new com.google.android.gms.internal.zzcy(this, v5_11);
            } catch (String v5_10) {
                throw new com.google.android.gms.internal.zzcy(this, v5_10);
            } catch (String v5_9) {
                throw new com.google.android.gms.internal.zzcy(this, v5_9);
            } catch (String v5_8) {
                throw new com.google.android.gms.internal.zzcy(this, v5_8);
            } catch (String v5_7) {
                throw new com.google.android.gms.internal.zzcy(this, v5_7);
            }
            com.google.android.gms.internal.zzcx.getCipher().init(1, new javax.crypto.spec.SecretKeySpec(p5, "AES"), 0);
            int v6_1 = com.google.android.gms.internal.zzcx.getCipher().doFinal(p6);
            java.nio.ByteBuffer v0_3 = com.google.android.gms.internal.zzcx.getCipher().getIV();
            String v5_2 = (v6_1.length + v0_3.length);
            java.nio.ByteBuffer v1_3 = java.nio.ByteBuffer.allocate(v5_2);
            v1_3.put(v0_3).put(v6_1);
            v1_3.flip();
            String v5_4 = new byte[v5_2];
            v1_3.get(v5_4);
            return com.google.android.gms.internal.zzbv.zza(v5_4, 0);
        }
    }

Method com.google.android.gms.internal.zzcx.getCipher() calling method javax.crypto.Cipher.getInstance()


    private static javax.crypto.Cipher getCipher()
    {
        try {
            if (com.google.android.gms.internal.zzcx.zzaic == null) {
                com.google.android.gms.internal.zzcx.zzaic = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5Padding");
            }
        } catch (javax.crypto.Cipher v1_4) {
            throw v1_4;
        }
        return com.google.android.gms.internal.zzcx.zzaic;
    }

Method cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl$CipherGen.getLanManagerSessionKey() calling method javax.crypto.Cipher.getInstance()


    public byte[] getLanManagerSessionKey()
    {
        if (this.lanManagerSessionKey == null) {
            try {
                Exception v0_3 = new byte[14];
                System.arraycopy(this.getLMHash(), 0, v0_3, 0, 8);
                java.util.Arrays.fill(v0_3, 8, v0_3.length, -67);
                cz.msebera.android.httpclient.impl.auth.NTLMEngineException v1_0 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.access$900(v0_3, 0);
                Exception v0_1 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.access$900(v0_3, 7);
                String v2_0 = new byte[8];
                System.arraycopy(this.getLMResponse(), 0, v2_0, 0, v2_0.length);
                int v4_4 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
                v4_4.init(1, v1_0);
                cz.msebera.android.httpclient.impl.auth.NTLMEngineException v1_1 = v4_4.doFinal(v2_0);
                int v4_6 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
                v4_6.init(1, v0_1);
                Exception v0_4 = v4_6.doFinal(v2_0);
                String v2_2 = new byte[16];
                this.lanManagerSessionKey = v2_2;
                System.arraycopy(v1_1, 0, this.lanManagerSessionKey, 0, v1_1.length);
                System.arraycopy(v0_4, 0, this.lanManagerSessionKey, v1_1.length, v0_4.length);
            } catch (Exception v0_5) {
                throw new cz.msebera.android.httpclient.impl.auth.NTLMEngineException(v0_5.getMessage(), v0_5);
            }
        }
        return this.lanManagerSessionKey;
    }

Method com.google.android.gms.internal.zzdxg.<init>() calling method javax.crypto.Cipher.getInstance()


    public zzdxg(byte[] p3, int p4)
    {
        if ((p4 != 12) && (p4 != 16)) {
            throw new IllegalArgumentException("IV size should be either 12 or 16 bytes");
        } else {
            this.zzmkk = p4;
            this.zzmkf = new javax.crypto.spec.SecretKeySpec(p3, "AES");
            IllegalArgumentException v3_2 = javax.crypto.Cipher.getInstance("AES/ECB/NOPADDING");
            v3_2.init(1, this.zzmkf);
            String v4_4 = new byte[16];
            this.zzmki = com.google.android.gms.internal.zzdxg.zzak(v3_2.doFinal(v4_4));
            this.zzmkj = com.google.android.gms.internal.zzdxg.zzak(this.zzmki);
            return;
        }
    }

Method org.apache.http.impl.auth.NTLMEngineImpl$CipherGen.getLanManagerSessionKey() calling method javax.crypto.Cipher.getInstance()


    public byte[] getLanManagerSessionKey()
    {
        if (this.lanManagerSessionKey == null) {
            try {
                Exception v0_3 = new byte[14];
                System.arraycopy(this.getLMHash(), 0, v0_3, 0, 8);
                java.util.Arrays.fill(v0_3, 8, v0_3.length, -67);
                org.apache.http.impl.auth.NTLMEngineException v1_0 = org.apache.http.impl.auth.NTLMEngineImpl.access$900(v0_3, 0);
                Exception v0_1 = org.apache.http.impl.auth.NTLMEngineImpl.access$900(v0_3, 7);
                String v2_0 = new byte[8];
                System.arraycopy(this.getLMResponse(), 0, v2_0, 0, v2_0.length);
                int v4_4 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
                v4_4.init(1, v1_0);
                org.apache.http.impl.auth.NTLMEngineException v1_1 = v4_4.doFinal(v2_0);
                int v4_6 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
                v4_6.init(1, v0_1);
                Exception v0_4 = v4_6.doFinal(v2_0);
                String v2_2 = new byte[16];
                this.lanManagerSessionKey = v2_2;
                System.arraycopy(v1_1, 0, this.lanManagerSessionKey, 0, v1_1.length);
                System.arraycopy(v0_4, 0, this.lanManagerSessionKey, v1_1.length, v0_4.length);
            } catch (Exception v0_5) {
                throw new org.apache.http.impl.auth.NTLMEngineException(v0_5.getMessage(), v0_5);
            }
        }
        return this.lanManagerSessionKey;
    }

Method org.apache.http.impl.auth.NTLMEngineImpl.RC4() calling method javax.crypto.Cipher.getInstance()


    static byte[] RC4(byte[] p4, byte[] p5)
    {
        try {
            String v0_2 = javax.crypto.Cipher.getInstance("RC4");
            v0_2.init(1, new javax.crypto.spec.SecretKeySpec(p5, "RC4"));
            return v0_2.doFinal(p4);
        } catch (Exception v4_1) {
            throw new org.apache.http.impl.auth.NTLMEngineException(v4_1.getMessage(), v4_1);
        }
    }

Method org.apache.http.impl.auth.NTLMEngineImpl.lmHash() calling method javax.crypto.Cipher.getInstance()


    private static byte[] lmHash(String p5)
    {
        try {
            Exception v5_5 = p5.toUpperCase(java.util.Locale.ENGLISH).getBytes("US-ASCII");
            String v1_0 = new byte[14];
            System.arraycopy(v5_5, 0, v1_0, 0, Math.min(v5_5.length, 14));
            Exception v5_1 = org.apache.http.impl.auth.NTLMEngineImpl.createDESKey(v1_0, 0);
            org.apache.http.impl.auth.NTLMEngineException v0_2 = org.apache.http.impl.auth.NTLMEngineImpl.createDESKey(v1_0, 7);
            String v1_2 = "KGS!@#$%".getBytes("US-ASCII");
            int v3_2 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
            v3_2.init(1, v5_1);
            Exception v5_3 = v3_2.doFinal(v1_2);
            v3_2.init(1, v0_2);
            org.apache.http.impl.auth.NTLMEngineException v0_4 = v3_2.doFinal(v1_2);
            String v1_4 = new byte[16];
            System.arraycopy(v5_3, 0, v1_4, 0, 8);
            System.arraycopy(v0_4, 0, v1_4, 8, 8);
            return v1_4;
        } catch (Exception v5_4) {
            throw new org.apache.http.impl.auth.NTLMEngineException(v5_4.getMessage(), v5_4);
        }
    }

Method org.apache.http.impl.auth.NTLMEngineImpl.lmResponse() calling method javax.crypto.Cipher.getInstance()


    private static byte[] lmResponse(byte[] p6, byte[] p7)
    {
        try {
            String v0_1 = new byte[21];
            System.arraycopy(p6, 0, v0_1, 0, 16);
            Exception v6_3 = org.apache.http.impl.auth.NTLMEngineImpl.createDESKey(v0_1, 0);
            byte[] v3_2 = org.apache.http.impl.auth.NTLMEngineImpl.createDESKey(v0_1, 7);
            String v0_2 = org.apache.http.impl.auth.NTLMEngineImpl.createDESKey(v0_1, 14);
            int v4_2 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
            v4_2.init(1, v6_3);
            Exception v6_1 = v4_2.doFinal(p7);
            v4_2.init(1, v3_2);
            byte[] v3_0 = v4_2.doFinal(p7);
            v4_2.init(1, v0_2);
            org.apache.http.impl.auth.NTLMEngineException v7_1 = v4_2.doFinal(p7);
            String v0_4 = new byte[24];
            System.arraycopy(v6_1, 0, v0_4, 0, 8);
            System.arraycopy(v3_0, 0, v0_4, 8, 8);
            System.arraycopy(v7_1, 0, v0_4, 16, 8);
            return v0_4;
        } catch (Exception v6_2) {
            throw new org.apache.http.impl.auth.NTLMEngineException(v6_2.getMessage(), v6_2);
        }
    }

Method com.google.android.gms.internal.zzdxg.zzd() calling method javax.crypto.Cipher.getInstance()


    public final byte[] zzd(byte[] p16, byte[] p17)
    {
        if (p16.length > ((2147483647 - this.zzmkk) - 16)) {
            throw new java.security.GeneralSecurityException("plaintext too long");
        } else {
            byte[] v9 = new byte[((this.zzmkk + p16.length) + 16)];
            byte v3_0 = com.google.android.gms.internal.zzdyl.zzgy(this.zzmkk);
            int v10 = 0;
            System.arraycopy(v3_0, 0, v9, 0, this.zzmkk);
            javax.crypto.Cipher v11 = javax.crypto.Cipher.getInstance("AES/ECB/NOPADDING");
            v11.init(1, this.zzmkf);
            String v1_3 = v11;
            byte[] v13 = this.zza(v1_3, 0, v3_0, 0, v3_0.length);
            byte[] v14 = this.zza(v1_3, 1, p17, 0, p17.length);
            java.security.GeneralSecurityException v0_11 = javax.crypto.Cipher.getInstance("AES/CTR/NOPADDING");
            v0_11.init(1, this.zzmkf, new javax.crypto.spec.IvParameterSpec(v13));
            v0_11.doFinal(p16, 0, p16.length, v9, this.zzmkk);
            java.security.GeneralSecurityException v0_13 = this.zza(v11, 2, v9, this.zzmkk, p16.length);
            while (v10 < 16) {
                v9[((p16.length + this.zzmkk) + v10)] = ((byte) ((v14[v10] ^ v13[v10]) ^ v0_13[v10]));
                v10++;
            }
            return v9;
        }
    }

Method com.google.android.gms.internal.zzdxz.zzb() calling method javax.crypto.Cipher.getInstance()


    public final synthetic Object zzb(String p1, java.security.Provider p2)
    {
        if (p2 != null) {
            return javax.crypto.Cipher.getInstance(p1, p2);
        } else {
            return javax.crypto.Cipher.getInstance(p1);
        }
    }

Method com.telemed.ae.ui.common.PreHomeScreenActivity.cipherInit() calling method javax.crypto.Cipher.getInstance()


    public boolean cipherInit()
    {
        try {
            this.cipher = javax.crypto.Cipher.getInstance("AES/CBC/PKCS7Padding");
            try {
                this.keyStore.load(0);
                this.cipher.init(1, ((javax.crypto.SecretKey) this.keyStore.getKey("adtc", 0)));
                return 1;
            } catch (android.security.keystore.KeyPermanentlyInvalidatedException) {
                return 0;
            } catch (java.security.KeyStoreException v0_5) {
                throw new RuntimeException("Failed to init Cipher", v0_5);
            }
        } catch (java.security.KeyStoreException v0_7) {
            throw new RuntimeException("Failed to get Cipher", v0_7);
        }
        this.keyStore.load(0);
        this.cipher.init(1, ((javax.crypto.SecretKey) this.keyStore.getKey("adtc", 0)));
        return 1;
    }

Method com.telemed.ae.ui.common.ValidatePin.cipherInit() calling method javax.crypto.Cipher.getInstance()


    public boolean cipherInit()
    {
        try {
            this.cipher = javax.crypto.Cipher.getInstance("AES/CBC/PKCS7Padding");
            try {
                this.keyStore.load(0);
                this.cipher.init(1, ((javax.crypto.SecretKey) this.keyStore.getKey("adtc", 0)));
                return 1;
            } catch (android.security.keystore.KeyPermanentlyInvalidatedException) {
                return 0;
            } catch (java.security.KeyStoreException v0_5) {
                throw new RuntimeException("Failed to init Cipher", v0_5);
            }
        } catch (java.security.KeyStoreException v0_7) {
            throw new RuntimeException("Failed to get Cipher", v0_7);
        }
        this.keyStore.load(0);
        this.cipher.init(1, ((javax.crypto.SecretKey) this.keyStore.getKey("adtc", 0)));
        return 1;
    }

Method cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.RC4() calling method javax.crypto.Cipher.getInstance()


    static byte[] RC4(byte[] p4, byte[] p5)
    {
        try {
            String v0_2 = javax.crypto.Cipher.getInstance("RC4");
            v0_2.init(1, new javax.crypto.spec.SecretKeySpec(p5, "RC4"));
            return v0_2.doFinal(p4);
        } catch (Exception v4_1) {
            throw new cz.msebera.android.httpclient.impl.auth.NTLMEngineException(v4_1.getMessage(), v4_1);
        }
    }

Method cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.lmHash() calling method javax.crypto.Cipher.getInstance()


    private static byte[] lmHash(String p5)
    {
        try {
            Exception v5_5 = p5.toUpperCase(java.util.Locale.ENGLISH).getBytes("US-ASCII");
            String v1_0 = new byte[14];
            System.arraycopy(v5_5, 0, v1_0, 0, Math.min(v5_5.length, 14));
            Exception v5_1 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.createDESKey(v1_0, 0);
            cz.msebera.android.httpclient.impl.auth.NTLMEngineException v0_2 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.createDESKey(v1_0, 7);
            String v1_2 = "KGS!@#$%".getBytes("US-ASCII");
            int v3_2 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
            v3_2.init(1, v5_1);
            Exception v5_3 = v3_2.doFinal(v1_2);
            v3_2.init(1, v0_2);
            cz.msebera.android.httpclient.impl.auth.NTLMEngineException v0_4 = v3_2.doFinal(v1_2);
            String v1_4 = new byte[16];
            System.arraycopy(v5_3, 0, v1_4, 0, 8);
            System.arraycopy(v0_4, 0, v1_4, 8, 8);
            return v1_4;
        } catch (Exception v5_4) {
            throw new cz.msebera.android.httpclient.impl.auth.NTLMEngineException(v5_4.getMessage(), v5_4);
        }
    }

Method cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.lmResponse() calling method javax.crypto.Cipher.getInstance()


    private static byte[] lmResponse(byte[] p6, byte[] p7)
    {
        try {
            String v0_1 = new byte[21];
            System.arraycopy(p6, 0, v0_1, 0, 16);
            Exception v6_3 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.createDESKey(v0_1, 0);
            byte[] v3_2 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.createDESKey(v0_1, 7);
            String v0_2 = cz.msebera.android.httpclient.impl.auth.NTLMEngineImpl.createDESKey(v0_1, 14);
            int v4_2 = javax.crypto.Cipher.getInstance("DES/ECB/NoPadding");
            v4_2.init(1, v6_3);
            Exception v6_1 = v4_2.doFinal(p7);
            v4_2.init(1, v3_2);
            byte[] v3_0 = v4_2.doFinal(p7);
            v4_2.init(1, v0_2);
            cz.msebera.android.httpclient.impl.auth.NTLMEngineException v7_1 = v4_2.doFinal(p7);
            String v0_4 = new byte[24];
            System.arraycopy(v6_1, 0, v0_4, 0, 8);
            System.arraycopy(v3_0, 0, v0_4, 8, 8);
            System.arraycopy(v7_1, 0, v0_4, 16, 8);
            return v0_4;
        } catch (Exception v6_2) {
            throw new cz.msebera.android.httpclient.impl.auth.NTLMEngineException(v6_2.getMessage(), v6_2);
        }
    }

Method com.google.android.gms.internal.zzdgv.zza() calling method javax.crypto.Cipher.getInstance()

Couldn't retrieve source code

Method com.telemed.ae.ui.common.adapter.PreHomeScreenAdapter.generateKey() calling method javax.crypto.KeyGenerator.generateKey()


    protected void generateKey()
    {
        this.keyStore = java.security.KeyStore.getInstance("AndroidKeyStore");
        try {
            java.security.NoSuchAlgorithmException v0_4 = javax.crypto.KeyGenerator.getInstance("AES", "AndroidKeyStore");
            try {
                this.keyStore.load(0);
                v0_4.init(new android.security.keystore.KeyGenParameterSpec$Builder("adtc", 3).setBlockModes(new String[] {"CBC"})).setUserAuthenticationRequired(1).setEncryptionPaddings(new String[] {"PKCS7Padding"})).build());
                v0_4.generateKey();
                return;
            } catch (java.security.NoSuchAlgorithmException v0_2) {
                throw new RuntimeException(v0_2);
            }
        } catch (java.security.NoSuchAlgorithmException v0_5) {
            throw new RuntimeException("Failed to get KeyGenerator instance", v0_5);
        }
        this.keyStore.load(0);
        v0_4.init(new android.security.keystore.KeyGenParameterSpec$Builder("adtc", 3).setBlockModes(new String[] {"CBC"})).setUserAuthenticationRequired(1).setEncryptionPaddings(new String[] {"PKCS7Padding"})).build());
        v0_4.generateKey();
        return;
    }

Method com.telemed.ae.ui.common.PreHomeScreenActivity.generateKey() calling method javax.crypto.KeyGenerator.generateKey()


    protected void generateKey()
    {
        this.keyStore = java.security.KeyStore.getInstance("AndroidKeyStore");
        try {
            java.security.NoSuchAlgorithmException v0_4 = javax.crypto.KeyGenerator.getInstance("AES", "AndroidKeyStore");
            try {
                this.keyStore.load(0);
                v0_4.init(new android.security.keystore.KeyGenParameterSpec$Builder("adtc", 3).setBlockModes(new String[] {"CBC"})).setUserAuthenticationRequired(1).setEncryptionPaddings(new String[] {"PKCS7Padding"})).build());
                v0_4.generateKey();
                return;
            } catch (java.security.NoSuchAlgorithmException v0_2) {
                throw new RuntimeException(v0_2);
            }
        } catch (java.security.NoSuchAlgorithmException v0_5) {
            throw new RuntimeException("Failed to get KeyGenerator instance", v0_5);
        }
        this.keyStore.load(0);
        v0_4.init(new android.security.keystore.KeyGenParameterSpec$Builder("adtc", 3).setBlockModes(new String[] {"CBC"})).setUserAuthenticationRequired(1).setEncryptionPaddings(new String[] {"PKCS7Padding"})).build());
        v0_4.generateKey();
        return;
    }

Method com.telemed.ae.manager.Encryptor.decrypt() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public static String decrypt(String p4)
    {
        try {
            String v0_4 = new javax.crypto.spec.IvParameterSpec(com.telemed.ae.manager.Encryptor.initVector.getBytes("UTF-8"));
            javax.crypto.spec.SecretKeySpec v1_1 = new javax.crypto.spec.SecretKeySpec(com.telemed.ae.manager.Encryptor.key.getBytes("UTF-8"), "AES");
            javax.crypto.Cipher v2_2 = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5PADDING");
            v2_2.init(2, v1_1, v0_4);
            return new String(v2_2.doFinal(android.util.Base64.decode(p4, 0)));
        } catch (int v4_3) {
            v4_3.printStackTrace();
            return 0;
        }
    }

Method com.telemed.ae.ui.common.ValidatePin.generateKey() calling method javax.crypto.KeyGenerator.generateKey()


    protected void generateKey()
    {
        try {
            this.keyStore = java.security.KeyStore.getInstance("AndroidKeyStore");
            try {
                java.security.NoSuchAlgorithmException v0_6 = javax.crypto.KeyGenerator.getInstance("AES", "AndroidKeyStore");
                try {
                    this.keyStore.load(0);
                    v0_6.init(new android.security.keystore.KeyGenParameterSpec$Builder("adtc", 3).setBlockModes(new String[] {"CBC"})).setUserAuthenticationRequired(1).setEncryptionPaddings(new String[] {"PKCS7Padding"})).build());
                    v0_6.generateKey();
                    return;
                } catch (java.security.NoSuchAlgorithmException v0_4) {
                    throw new RuntimeException(v0_4);
                }
            } catch (java.security.NoSuchAlgorithmException v0_1) {
                throw new RuntimeException("Failed to get KeyGenerator instance", v0_1);
            }
            this.keyStore.load(0);
            v0_6.init(new android.security.keystore.KeyGenParameterSpec$Builder("adtc", 3).setBlockModes(new String[] {"CBC"})).setUserAuthenticationRequired(1).setEncryptionPaddings(new String[] {"PKCS7Padding"})).build());
            v0_6.generateKey();
            return;
        } catch (java.security.NoSuchAlgorithmException v0_3) {
            v0_3.printStackTrace();
        }
    }

Method com.telemed.ae.ui.common.adapter.PreHomeScreenAdapter.generateKey() calling method javax.crypto.KeyGenerator.getInstance()


    protected void generateKey()
    {
        this.keyStore = java.security.KeyStore.getInstance("AndroidKeyStore");
        try {
            java.security.NoSuchAlgorithmException v0_4 = javax.crypto.KeyGenerator.getInstance("AES", "AndroidKeyStore");
            try {
                this.keyStore.load(0);
                v0_4.init(new android.security.keystore.KeyGenParameterSpec$Builder("adtc", 3).setBlockModes(new String[] {"CBC"})).setUserAuthenticationRequired(1).setEncryptionPaddings(new String[] {"PKCS7Padding"})).build());
                v0_4.generateKey();
                return;
            } catch (java.security.NoSuchAlgorithmException v0_2) {
                throw new RuntimeException(v0_2);
            }
        } catch (java.security.NoSuchAlgorithmException v0_5) {
            throw new RuntimeException("Failed to get KeyGenerator instance", v0_5);
        }
        this.keyStore.load(0);
        v0_4.init(new android.security.keystore.KeyGenParameterSpec$Builder("adtc", 3).setBlockModes(new String[] {"CBC"})).setUserAuthenticationRequired(1).setEncryptionPaddings(new String[] {"PKCS7Padding"})).build());
        v0_4.generateKey();
        return;
    }

Method com.telemed.ae.ui.common.PreHomeScreenActivity.generateKey() calling method javax.crypto.KeyGenerator.getInstance()


    protected void generateKey()
    {
        this.keyStore = java.security.KeyStore.getInstance("AndroidKeyStore");
        try {
            java.security.NoSuchAlgorithmException v0_4 = javax.crypto.KeyGenerator.getInstance("AES", "AndroidKeyStore");
            try {
                this.keyStore.load(0);
                v0_4.init(new android.security.keystore.KeyGenParameterSpec$Builder("adtc", 3).setBlockModes(new String[] {"CBC"})).setUserAuthenticationRequired(1).setEncryptionPaddings(new String[] {"PKCS7Padding"})).build());
                v0_4.generateKey();
                return;
            } catch (java.security.NoSuchAlgorithmException v0_2) {
                throw new RuntimeException(v0_2);
            }
        } catch (java.security.NoSuchAlgorithmException v0_5) {
            throw new RuntimeException("Failed to get KeyGenerator instance", v0_5);
        }
        this.keyStore.load(0);
        v0_4.init(new android.security.keystore.KeyGenParameterSpec$Builder("adtc", 3).setBlockModes(new String[] {"CBC"})).setUserAuthenticationRequired(1).setEncryptionPaddings(new String[] {"PKCS7Padding"})).build());
        v0_4.generateKey();
        return;
    }

Method com.telemed.ae.ui.common.ValidatePin.generateKey() calling method javax.crypto.KeyGenerator.getInstance()


    protected void generateKey()
    {
        try {
            this.keyStore = java.security.KeyStore.getInstance("AndroidKeyStore");
            try {
                java.security.NoSuchAlgorithmException v0_6 = javax.crypto.KeyGenerator.getInstance("AES", "AndroidKeyStore");
                try {
                    this.keyStore.load(0);
                    v0_6.init(new android.security.keystore.KeyGenParameterSpec$Builder("adtc", 3).setBlockModes(new String[] {"CBC"})).setUserAuthenticationRequired(1).setEncryptionPaddings(new String[] {"PKCS7Padding"})).build());
                    v0_6.generateKey();
                    return;
                } catch (java.security.NoSuchAlgorithmException v0_4) {
                    throw new RuntimeException(v0_4);
                }
            } catch (java.security.NoSuchAlgorithmException v0_1) {
                throw new RuntimeException("Failed to get KeyGenerator instance", v0_1);
            }
            this.keyStore.load(0);
            v0_6.init(new android.security.keystore.KeyGenParameterSpec$Builder("adtc", 3).setBlockModes(new String[] {"CBC"})).setUserAuthenticationRequired(1).setEncryptionPaddings(new String[] {"PKCS7Padding"})).build());
            v0_6.generateKey();
            return;
        } catch (java.security.NoSuchAlgorithmException v0_3) {
            v0_3.printStackTrace();
        }
    }

Method com.google.android.gms.internal.zzcx.zzb() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public final byte[] zzb(byte[] p6, String p7)
    {
        if (p6.length != 16) {
            throw new com.google.android.gms.internal.zzcy(this);
        } else {
            try {
                Throwable v7_20 = com.google.android.gms.internal.zzbv.zza(p7, 0);
            } catch (com.google.android.gms.internal.zzcy v6_11) {
                throw new com.google.android.gms.internal.zzcy(this, v6_11);
            } catch (com.google.android.gms.internal.zzcy v6_10) {
                throw new com.google.android.gms.internal.zzcy(this, v6_10);
            } catch (com.google.android.gms.internal.zzcy v6_9) {
                throw new com.google.android.gms.internal.zzcy(this, v6_9);
            } catch (com.google.android.gms.internal.zzcy v6_8) {
                throw new com.google.android.gms.internal.zzcy(this, v6_8);
            } catch (com.google.android.gms.internal.zzcy v6_7) {
                throw new com.google.android.gms.internal.zzcy(this, v6_7);
            } catch (com.google.android.gms.internal.zzcy v6_6) {
                throw new com.google.android.gms.internal.zzcy(this, v6_6);
            } catch (com.google.android.gms.internal.zzcy v6_5) {
                throw new com.google.android.gms.internal.zzcy(this, v6_5);
            }
            if (v7_20.length <= 16) {
                throw new com.google.android.gms.internal.zzcy(this);
            } else {
                javax.crypto.Cipher v0_2 = java.nio.ByteBuffer.allocate(v7_20.length);
                v0_2.put(v7_20);
                v0_2.flip();
                byte[] v2 = new byte[16];
                Throwable v7_3 = new byte[(v7_20.length - 16)];
                v0_2.get(v2);
                v0_2.get(v7_3);
                com.google.android.gms.internal.zzcx.getCipher().init(2, new javax.crypto.spec.SecretKeySpec(p6, "AES"), new javax.crypto.spec.IvParameterSpec(v2));
                return com.google.android.gms.internal.zzcx.getCipher().doFinal(v7_3);
            }
        }
    }

Method com.telemed.ae.manager.Encryptor.encrypt() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public static String encrypt(String p4)
    {
        try {
            int v0_2 = new javax.crypto.spec.IvParameterSpec(com.telemed.ae.manager.Encryptor.initVector.getBytes("UTF-8"));
            javax.crypto.spec.SecretKeySpec v1_1 = new javax.crypto.spec.SecretKeySpec(com.telemed.ae.manager.Encryptor.key.getBytes("UTF-8"), "AES");
            javax.crypto.Cipher v2_2 = javax.crypto.Cipher.getInstance("AES/CBC/PKCS5PADDING");
            v2_2.init(1, v1_1, v0_2);
            return android.util.Base64.encodeToString(v2_2.doFinal(p4.getBytes()), 0);
        } catch (int v4_4) {
            v4_4.printStackTrace();
            return 0;
        }
    }

Method com.google.android.gms.internal.zzdxf.zzaj() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public final byte[] zzaj(byte[] p9)
    {
        if (p9.length > (2147483647 - this.zzmkg)) {
            int v2_6 = (2147483647 - this.zzmkg);
            StringBuilder v1_1 = new StringBuilder(43);
            v1_1.append("plaintext length can not exceed ");
            v1_1.append(v2_6);
            throw new java.security.GeneralSecurityException(v1_1.toString());
        } else {
            String v0_5 = new byte[(this.zzmkg + p9.length)];
            StringBuilder v1_4 = com.google.android.gms.internal.zzdyl.zzgy(this.zzmkg);
            System.arraycopy(v1_4, 0, v0_5, 0, this.zzmkg);
            int v7 = p9.length;
            int v6 = this.zzmkg;
            int v2_4 = ((javax.crypto.Cipher) com.google.android.gms.internal.zzdxx.zzmlk.zzoy("AES/CTR/NoPadding"));
            int v4_2 = new byte[this.zzmkh];
            System.arraycopy(v1_4, 0, v4_2, 0, this.zzmkg);
            v2_4.init(1, this.zzmkf, new javax.crypto.spec.IvParameterSpec(v4_2));
            if (v2_4.doFinal(p9, 0, v7, v0_5, v6) != v7) {
                throw new java.security.GeneralSecurityException("stored output\'s length does not match input\'s length");
            } else {
                return v0_5;
            }
        }
    }

Method com.google.android.gms.internal.zzdxg.zzd() calling method javax.crypto.spec.IvParameterSpec.<init>()


    public final byte[] zzd(byte[] p16, byte[] p17)
    {
        if (p16.length > ((2147483647 - this.zzmkk) - 16)) {
            throw new java.security.GeneralSecurityException("plaintext too long");
        } else {
            byte[] v9 = new byte[((this.zzmkk + p16.length) + 16)];
            byte v3_0 = com.google.android.gms.internal.zzdyl.zzgy(this.zzmkk);
            int v10 = 0;
            System.arraycopy(v3_0, 0, v9, 0, this.zzmkk);
            javax.crypto.Cipher v11 = javax.crypto.Cipher.getInstance("AES/ECB/NOPADDING");
            v11.init(1, this.zzmkf);
            String v1_3 = v11;
            byte[] v13 = this.zza(v1_3, 0, v3_0, 0, v3_0.length);
            byte[] v14 = this.zza(v1_3, 1, p17, 0, p17.length);
            java.security.GeneralSecurityException v0_11 = javax.crypto.Cipher.getInstance("AES/CTR/NOPADDING");
            v0_11.init(1, this.zzmkf, new javax.crypto.spec.IvParameterSpec(v13));
            v0_11.doFinal(p16, 0, p16.length, v9, this.zzmkk);
            java.security.GeneralSecurityException v0_13 = this.zza(v11, 2, v9, this.zzmkk, p16.length);
            while (v10 < 16) {
                v9[((p16.length + this.zzmkk) + v10)] = ((byte) ((v14[v10] ^ v13[v10]) ^ v0_13[v10]));
                v10++;
            }
            return v9;
        }
    }

Method com.google.android.gms.internal.zzdgv.zza() calling method javax.crypto.spec.IvParameterSpec.<init>()

Couldn't retrieve source code