Files
rr3-apk/smali_classes2/com/google/android/exoplayer2/C.smali
Daniel Elliott f3960ee359 Add Discord APKTool decompilation (Smali source for modding)
- Imported from https://github.com/supermegamestre/Project-Real-Resurrection-3
- APKTool decompilation (Smali bytecode) for modding and rebuilding APK
- Supports both 32-bit (armeabi-v7a) and 64-bit (arm64-v8a) architectures
- Includes full Smali source, resources, and native libraries
- Ready to rebuild APK after modifications with apktool b command
- Added comprehensive README-apktool.md with modding guide

This branch complements the JADX branches:
- Use JADX (main/discord-community) to UNDERSTAND code (readable Java)
- Use APKTool (this branch) to MODIFY and REBUILD APK (editable Smali)

Total: 44,417 files, 538.51 MB Smali source code
2026-02-18 16:13:44 -08:00

77 lines
2.0 KiB
Smali

.class public abstract Lcom/google/android/exoplayer2/C;
.super Ljava/lang/Object;
.source "SourceFile"
# static fields
.field public static final CLEARKEY_UUID:Ljava/util/UUID;
.field public static final COMMON_PSSH_UUID:Ljava/util/UUID;
.field public static final PLAYREADY_UUID:Ljava/util/UUID;
.field public static final UUID_NIL:Ljava/util/UUID;
.field public static final WIDEVINE_UUID:Ljava/util/UUID;
# direct methods
.method static constructor <clinit>()V
.locals 5
.line 680
new-instance v0, Ljava/util/UUID;
const-wide/16 v1, 0x0
invoke-direct {v0, v1, v2, v1, v2}, Ljava/util/UUID;-><init>(JJ)V
sput-object v0, Lcom/google/android/exoplayer2/C;->UUID_NIL:Ljava/util/UUID;
.line 687
new-instance v0, Ljava/util/UUID;
const-wide v1, 0x1077efecc0b24d02L
const-wide v3, -0x531cc3e1ad1d04b5L # -1.8442503140481377E-92
invoke-direct {v0, v1, v2, v3, v4}, Ljava/util/UUID;-><init>(JJ)V
sput-object v0, Lcom/google/android/exoplayer2/C;->COMMON_PSSH_UUID:Ljava/util/UUID;
.line 694
new-instance v0, Ljava/util/UUID;
const-wide v1, -0x1d8e62a7567a4c37L # -1.6229728350858627E166
const-wide v3, 0x781ab030af78d30eL # 3.524813189889319E270
invoke-direct {v0, v1, v2, v3, v4}, Ljava/util/UUID;-><init>(JJ)V
sput-object v0, Lcom/google/android/exoplayer2/C;->CLEARKEY_UUID:Ljava/util/UUID;
.line 701
new-instance v0, Ljava/util/UUID;
const-wide v1, -0x121074568629b532L # -3.563403477674908E221
const-wide v3, -0x5c37d8232ae2de13L
invoke-direct {v0, v1, v2, v3, v4}, Ljava/util/UUID;-><init>(JJ)V
sput-object v0, Lcom/google/android/exoplayer2/C;->WIDEVINE_UUID:Ljava/util/UUID;
.line 709
new-instance v0, Ljava/util/UUID;
const-wide v1, -0x65fb0f8667bfbd7aL
const-wide v3, -0x546d19a41f77a06bL # -8.640911267670052E-99
invoke-direct {v0, v1, v2, v3, v4}, Ljava/util/UUID;-><init>(JJ)V
sput-object v0, Lcom/google/android/exoplayer2/C;->PLAYREADY_UUID:Ljava/util/UUID;
return-void
.end method