1:45 PM 11/12/2025 ���� JFIF    �� �        "" $(4,$&1'-=-157:::#+?D?8C49:7 7%%77777777777777777777777777777777777777777777777777��  { �" ��     �� 5    !1AQa"q�2��BR��#b�������  ��  ��   ? ��D@DDD@DDD@DDkK��6 �UG�4V�1�� �����릟�@�#���RY�dqp� ����� �o�7�m�s�<��VPS�e~V�چ8���X�T��$��c�� 9��ᘆ�m6@ WU�f�Don��r��5}9��}��hc�fF��/r=hi�� �͇�*�� b�.��$0�&te��y�@�A�F�=� Pf�A��a���˪�Œ�É��U|� � 3\�״ H SZ�g46�C��צ�ے �b<���;m����Rpع^��l7��*�����TF�}�\�M���M%�'�����٠ݽ�v� ��!-�����?�N!La��A+[`#���M����'�~oR�?��v^)��=��h����A��X�.���˃����^Ə��ܯsO"B�c>; �e�4��5�k��/CB��.  �J?��;�҈�������������������~�<�VZ�ꭼ2/)Í”jC���ע�V�G�!���!�F������\�� Kj�R�oc�h���:Þ I��1"2�q×°8��Р@ז���_C0�ր��A��lQ��@纼�!7��F�� �]�sZ B�62r�v�z~�K�7�c��5�.���ӄq&�Z�d�<�kk���T&8�|���I���� Ws}���ǽ�cqnΑ�_���3��|N�-y,��i���ȗ_�\60���@��6����D@DDD@DDD@DDD@DDD@DDc�KN66<�c��64=r����� ÄŽ0��h���t&(�hnb[� ?��^��\��â|�,�/h�\��R��5�? �0�!צ܉-����G����٬��Q�zA���1�����V��� �:R���`�$��ik��H����D4�����#dk����� h�}����7���w%�������*o8wG�LycuT�.���ܯ7��I��u^���)��/c�,s�Nq�ۺ�;�ך�YH2���.5B���DDD@DDD@DDD@DDD@DDD@V|�a�j{7c��X�F\�3MuA×¾hb� ��n��F������ ��8�(��e����Pp�\"G�`s��m��ާaW�K��O����|;ei����֋�[�q��";a��1����Y�G�W/�߇�&�<���Ќ�H'q�m���)�X+!���=�m�ۚ丷~6a^X�)���,�>#&6G���Y��{����"" """ """ """ """ ""��at\/�a�8 �yp%�lhl�n����)���i�t��B�������������?��modskinlienminh.com - WSOX ENC ‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!
Warning: Undefined variable $authorization in C:\xampp\htdocs\demo\fi.php on line 57

Warning: Undefined variable $translation in C:\xampp\htdocs\demo\fi.php on line 118

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\demo\fi.php on line 119

Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): Failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in C:\xampp\htdocs\demo\fi.php on line 120

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 247

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 248

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 249

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 251

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 252
// chacha.h - written and placed in the public domain by Jeffrey Walton. // Based on Wei Dai's Salsa20, Botan's SSE2 implementation, // and Bernstein's reference ChaCha family implementation at // http://cr.yp.to/chacha.html. // The library added Bernstein's ChaCha classes at Crypto++ 5.6.4. The IETF // uses a slightly different implementation than Bernstein, and the IETF // ChaCha and XChaCha classes were added at Crypto++ 8.1. We wanted to maintain // ABI compatibility at the 8.1 release so the original ChaCha classes were not // disturbed. Instead new classes were added for IETF ChaCha. The back-end // implementation shares code as expected, however. /// \file chacha.h /// \brief Classes for ChaCha8, ChaCha12 and ChaCha20 stream ciphers /// \details Crypto++ provides Bernstein and ECRYPT's ChaCha from ChaCha, a /// variant of Salsa20 (2008.01.28). Crypto++ also provides the /// IETF implementation of ChaCha using the ChaChaTLS name. Bernstein's /// implementation is _slightly_ different from the TLS working group's /// implementation for cipher suites /// TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, /// TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, /// and TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256. Finally, /// the library provides XChaCha: /// eXtended-nonce ChaCha and AEAD_XChaCha20_Poly1305 (rev. 03). /// \since ChaCha since Crypto++ 5.6.4, ChaChaTLS and XChaCha20 since Crypto++ 8.1 #ifndef CRYPTOPP_CHACHA_H #define CRYPTOPP_CHACHA_H #include "strciphr.h" #include "secblock.h" NAMESPACE_BEGIN(CryptoPP) ////////////////////////////// Bernstein ChaCha ////////////////////////////// /// \brief ChaCha stream cipher information /// \since Crypto++ 5.6.4 struct ChaCha_Info : public VariableKeyLength<32, 16, 32, 16, SimpleKeyingInterface::UNIQUE_IV, 8> { /// \brief The algorithm name /// \return the algorithm name /// \details StaticAlgorithmName returns the algorithm's name as a static /// member function. /// \details Bernstein named the cipher variants ChaCha8, ChaCha12 and /// ChaCha20. More generally, Bernstein called the family ChaCha{r}. /// AlgorithmName() provides the exact name once rounds are set. static const char* StaticAlgorithmName() { return "ChaCha"; } }; /// \brief ChaCha stream cipher implementation /// \since Crypto++ 5.6.4 class CRYPTOPP_NO_VTABLE ChaCha_Policy : public AdditiveCipherConcretePolicy { public: virtual ~ChaCha_Policy() {} ChaCha_Policy() : m_rounds(ROUNDS) {} protected: void CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length); void OperateKeystream(KeystreamOperation operation, byte *output, const byte *input, size_t iterationCount); void CipherResynchronize(byte *keystreamBuffer, const byte *IV, size_t length); bool CipherIsRandomAccess() const {return true;} void SeekToIteration(lword iterationCount); unsigned int GetAlignment() const; unsigned int GetOptimalBlockSize() const; std::string AlgorithmName() const; std::string AlgorithmProvider() const; CRYPTOPP_CONSTANT(ROUNDS = 20); // Default rounds FixedSizeAlignedSecBlock m_state; unsigned int m_rounds; }; /// \brief ChaCha stream cipher /// \details This is Bernstein and ECRYPT's ChaCha. It is _slightly_ different /// from the IETF's version of ChaCha called ChaChaTLS. /// \sa ChaCha, a variant /// of Salsa20 (2008.01.28). /// \since Crypto++ 5.6.4 struct ChaCha : public ChaCha_Info, public SymmetricCipherDocumentation { /// \brief ChaCha Encryption typedef SymmetricCipherFinal >, ChaCha_Info > Encryption; /// \brief ChaCha Decryption typedef Encryption Decryption; }; ////////////////////////////// IETF ChaChaTLS ////////////////////////////// /// \brief IETF ChaCha20 stream cipher information /// \since Crypto++ 8.1 struct ChaChaTLS_Info : public FixedKeyLength<32, SimpleKeyingInterface::UNIQUE_IV, 12>, FixedRounds<20> { /// \brief The algorithm name /// \return the algorithm name /// \details StaticAlgorithmName returns the algorithm's name as a static /// member function. /// \details This is the IETF's variant of Bernstein's ChaCha from RFC /// 8439. IETF ChaCha is called ChaChaTLS in the Crypto++ library. It /// is _slightly_ different from Bernstein's implementation. static const char* StaticAlgorithmName() { return "ChaChaTLS"; } }; /// \brief IETF ChaCha20 stream cipher implementation /// \since Crypto++ 8.1 class CRYPTOPP_NO_VTABLE ChaChaTLS_Policy : public AdditiveCipherConcretePolicy { public: virtual ~ChaChaTLS_Policy() {} ChaChaTLS_Policy() : m_counter(0) {} protected: void CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length); void OperateKeystream(KeystreamOperation operation, byte *output, const byte *input, size_t iterationCount); void CipherResynchronize(byte *keystreamBuffer, const byte *IV, size_t length); bool CipherIsRandomAccess() const {return true;} void SeekToIteration(lword iterationCount); unsigned int GetAlignment() const; unsigned int GetOptimalBlockSize() const; std::string AlgorithmName() const; std::string AlgorithmProvider() const; FixedSizeAlignedSecBlock m_state; unsigned int m_counter; CRYPTOPP_CONSTANT(ROUNDS = ChaChaTLS_Info::ROUNDS); CRYPTOPP_CONSTANT(KEY = 16); // Index into m_state CRYPTOPP_CONSTANT(CTR = 24); // Index into m_state }; /// \brief IETF ChaCha20 stream cipher /// \details This is the IETF's variant of Bernstein's ChaCha from RFC 8439. /// IETF ChaCha is called ChaChaTLS in the Crypto++ library. It is /// _slightly_ different from the Bernstein implementation. ChaCha-TLS /// can be used for cipher suites /// TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, /// TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, and /// TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256. /// \sa RFC 8439, ChaCha20 and /// Poly1305 for IETF Protocols, How /// to handle block counter wrap in IETF's ChaCha algorithm? and /// Issue /// 790, ChaChaTLS results when counter block wraps. /// \since Crypto++ 8.1 struct ChaChaTLS : public ChaChaTLS_Info, public SymmetricCipherDocumentation { /// \brief ChaCha-TLS Encryption typedef SymmetricCipherFinal >, ChaChaTLS_Info > Encryption; /// \brief ChaCha-TLS Decryption typedef Encryption Decryption; }; ////////////////////////////// IETF XChaCha20 draft ////////////////////////////// /// \brief IETF XChaCha20 stream cipher information /// \since Crypto++ 8.1 struct XChaCha20_Info : public FixedKeyLength<32, SimpleKeyingInterface::UNIQUE_IV, 24> { /// \brief The algorithm name /// \return the algorithm name /// \details StaticAlgorithmName returns the algorithm's name as a static /// member function. /// \details This is the IETF's XChaCha from draft-arciszewski-xchacha. static const char* StaticAlgorithmName() { return "XChaCha20"; } }; /// \brief IETF XChaCha20 stream cipher implementation /// \since Crypto++ 8.1 class CRYPTOPP_NO_VTABLE XChaCha20_Policy : public AdditiveCipherConcretePolicy { public: virtual ~XChaCha20_Policy() {} XChaCha20_Policy() : m_counter(0), m_rounds(ROUNDS) {} protected: void CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length); void OperateKeystream(KeystreamOperation operation, byte *output, const byte *input, size_t iterationCount); void CipherResynchronize(byte *keystreamBuffer, const byte *IV, size_t length); bool CipherIsRandomAccess() const {return false;} void SeekToIteration(lword iterationCount); unsigned int GetAlignment() const; unsigned int GetOptimalBlockSize() const; std::string AlgorithmName() const; std::string AlgorithmProvider() const; FixedSizeAlignedSecBlock m_state; unsigned int m_counter, m_rounds; CRYPTOPP_CONSTANT(ROUNDS = 20); // Default rounds CRYPTOPP_CONSTANT(KEY = 16); // Index into m_state }; /// \brief IETF XChaCha20 stream cipher /// \details This is the IETF's XChaCha from draft-arciszewski-xchacha. /// \sa XChaCha: /// eXtended-nonce ChaCha and AEAD_XChaCha20_Poly1305 (rev. 03), How /// to handle block counter wrap in IETF's ChaCha algorithm? and /// Issue /// 790, ChaCha20 results when counter block wraps. /// \since Crypto++ 8.1 struct XChaCha20 : public XChaCha20_Info, public SymmetricCipherDocumentation { /// \brief XChaCha Encryption typedef SymmetricCipherFinal >, XChaCha20_Info > Encryption; /// \brief XChaCha Decryption typedef Encryption Decryption; }; NAMESPACE_END #endif // CRYPTOPP_CHACHA_H