Files
Daniel Elliott c080f0d97f Add Discord community version (64-bit only)
- Added realracing3-community.apk (71.57 MB)
- Removed 32-bit support (armeabi-v7a)
- Only includes arm64-v8a libraries
- Decompiled source code included
- Added README-community.md with analysis
2026-02-18 15:48:36 -08:00

85 lines
3.2 KiB
Java

package com.google.android.gms.internal.ads;
import java.security.GeneralSecurityException;
import java.security.InvalidKeyException;
import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
/* loaded from: classes3.dex */
public final class zzgjp implements zzgdn {
private static final byte[] zza = zzgvf.zza("808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f");
private static final byte[] zzb = zzgvf.zza("070000004041424344454647");
private static final byte[] zzc = zzgvf.zza("a0784d7a4716f3feb4f64e7f4b39bf04");
private static final ThreadLocal zzd = new zzgjo();
private final SecretKey zze;
private final byte[] zzf;
private zzgjp(byte[] bArr, byte[] bArr2) throws GeneralSecurityException {
if (!zzgks.zza(1)) {
throw new GeneralSecurityException("Can not use ChaCha20Poly1305 in FIPS-mode.");
}
if (!zze()) {
throw new GeneralSecurityException("JCE does not support algorithm: ChaCha20-Poly1305");
}
if (bArr.length != 32) {
throw new InvalidKeyException("The key length in bytes must be 32.");
}
this.zze = new SecretKeySpec(bArr, "ChaCha20");
this.zzf = bArr2;
}
public static zzgdn zzb(zzggr zzggrVar) throws GeneralSecurityException {
return new zzgjp(zzggrVar.zzd().zzd(zzgdw.zza()), zzggrVar.zzc().zzc());
}
public static Cipher zzc() {
return (Cipher) zzd.get();
}
public static boolean zze() {
return zzd.get() != null;
}
/* JADX INFO: Access modifiers changed from: private */
public static boolean zzf(Cipher cipher) {
try {
IvParameterSpec ivParameterSpec = new IvParameterSpec(zzb);
byte[] bArr = zza;
cipher.init(2, new SecretKeySpec(bArr, "ChaCha20"), ivParameterSpec);
byte[] bArr2 = zzc;
if (cipher.doFinal(bArr2).length != 0) {
return false;
}
cipher.init(2, new SecretKeySpec(bArr, "ChaCha20"), ivParameterSpec);
return cipher.doFinal(bArr2).length == 0;
} catch (GeneralSecurityException unused) {
return false;
}
}
@Override // com.google.android.gms.internal.ads.zzgdn
public final byte[] zza(byte[] bArr, byte[] bArr2) throws GeneralSecurityException {
if (bArr == null) {
throw new NullPointerException("ciphertext is null");
}
byte[] bArr3 = this.zzf;
if (bArr.length < bArr3.length + 28) {
throw new GeneralSecurityException("ciphertext too short");
}
if (!zzgnu.zzc(bArr3, bArr)) {
throw new GeneralSecurityException("Decryption failed (OutputPrefix mismatch).");
}
byte[] bArr4 = new byte[12];
System.arraycopy(bArr, this.zzf.length, bArr4, 0, 12);
IvParameterSpec ivParameterSpec = new IvParameterSpec(bArr4);
Cipher cipher = (Cipher) zzd.get();
cipher.init(2, this.zze, ivParameterSpec);
if (bArr2 != null && bArr2.length != 0) {
cipher.updateAAD(bArr2);
}
return cipher.doFinal(bArr, this.zzf.length + 12, (r1 - r7) - 12);
}
}