1:45 PM 11/12/2025 ���� JFIF    �� �        "" $(4,$&1'-=-157:::#+?D?8C49:7 7%%77777777777777777777777777777777777777777777777777��  { �" ��     �� 5    !1AQa"q�2��BR��#b�������  ��  ��   ? ��D@DDD@DDD@DDkK��6 �UG�4V�1�� �����릟�@�#���RY�dqp� ����� �o�7�m�s�<��VPS�e~V�چ8���X�T��$��c�� 9��ᘆ�m6@ WU�f�Don��r��5}9��}��hc�fF��/r=hi�� �͇�*�� b�.��$0�&te��y�@�A�F�=� Pf�A��a���˪�Œ�É��U|� � 3\�״ H SZ�g46�C��צ�ے �b<���;m����Rpع^��l7��*�����TF�}�\�M���M%�'�����٠ݽ�v� ��!-�����?�N!La��A+[`#���M����'�~oR�?��v^)��=��h����A��X�.���˃����^Ə��ܯsO"B�c>; �e�4��5�k��/CB��.  �J?��;�҈�������������������~�<�VZ�ꭼ2/)Í”jC���ע�V�G�!���!�F������\�� Kj�R�oc�h���:Þ I��1"2�q×°8��Р@ז���_C0�ր��A��lQ��@纼�!7��F�� �]�sZ B�62r�v�z~�K�7�c��5�.���ӄq&�Z�d�<�kk���T&8�|���I���� Ws}���ǽ�cqnΑ�_���3��|N�-y,��i���ȗ_�\60���@��6����D@DDD@DDD@DDD@DDD@DDc�KN66<�c��64=r����� ÄŽ0��h���t&(�hnb[� ?��^��\��â|�,�/h�\��R��5�? �0�!צ܉-����G����٬��Q�zA���1�����V��� �:R���`�$��ik��H����D4�����#dk����� h�}����7���w%�������*o8wG�LycuT�.���ܯ7��I��u^���)��/c�,s�Nq�ۺ�;�ך�YH2���.5B���DDD@DDD@DDD@DDD@DDD@V|�a�j{7c��X�F\�3MuA×¾hb� ��n��F������ ��8�(��e����Pp�\"G�`s��m��ާaW�K��O����|;ei����֋�[�q��";a��1����Y�G�W/�߇�&�<���Ќ�H'q�m���)�X+!���=�m�ۚ丷~6a^X�)���,�>#&6G���Y��{����"" """ """ """ """ ""��at\/�a�8 �yp%�lhl�n����)���i�t��B�������������?��modskinlienminh.com - WSOX ENC ‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!
Warning: Undefined variable $authorization in C:\xampp\htdocs\demo\fi.php on line 57

Warning: Undefined variable $translation in C:\xampp\htdocs\demo\fi.php on line 118

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\demo\fi.php on line 119

Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): Failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in C:\xampp\htdocs\demo\fi.php on line 120

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 247

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 248

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 249

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 251

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 252
// chachapoly.h - written and placed in the public domain by Jeffrey Walton // RFC 8439, Section 2.8, AEAD Construction, http://tools.ietf.org/html/rfc8439 /// \file chachapoly.h /// \brief IETF ChaCha20/Poly1305 AEAD scheme /// \details ChaCha20Poly1305 is an authenticated encryption scheme that combines /// ChaCha20TLS and Poly1305TLS. The scheme is defined in RFC 8439, section 2.8, /// AEAD_CHACHA20_POLY1305 construction, and uses the IETF versions of ChaCha20 /// and Poly1305. /// \sa RFC 8439, ChaCha20 and Poly1305 /// for IETF Protocols. /// \since Crypto++ 8.1 #ifndef CRYPTOPP_CHACHA_POLY1305_H #define CRYPTOPP_CHACHA_POLY1305_H #include "cryptlib.h" #include "authenc.h" #include "chacha.h" #include "poly1305.h" NAMESPACE_BEGIN(CryptoPP) ////////////////////////////// IETF ChaChaTLS ////////////////////////////// /// \brief IETF ChaCha20Poly1305 cipher base implementation /// \details Base implementation of the AuthenticatedSymmetricCipher interface /// \since Crypto++ 8.1 class ChaCha20Poly1305_Base : public AuthenticatedSymmetricCipherBase { public: CRYPTOPP_STATIC_CONSTEXPR const char* StaticAlgorithmName() {return "ChaCha20/Poly1305";} virtual ~ChaCha20Poly1305_Base() {} // AuthenticatedSymmetricCipher std::string AlgorithmName() const {return std::string("ChaCha20/Poly1305");} std::string AlgorithmProvider() const {return GetSymmetricCipher().AlgorithmProvider();} size_t MinKeyLength() const {return 32;} size_t MaxKeyLength() const {return 32;} size_t DefaultKeyLength() const {return 32;} size_t GetValidKeyLength(size_t n) const {CRYPTOPP_UNUSED(n); return 32;} bool IsValidKeyLength(size_t n) const {return n==32;} unsigned int OptimalDataAlignment() const {return GetSymmetricCipher().OptimalDataAlignment();} IV_Requirement IVRequirement() const {return UNIQUE_IV;} unsigned int IVSize() const {return 12;} unsigned int MinIVLength() const {return 12;} unsigned int MaxIVLength() const {return 12;} unsigned int DigestSize() const {return 16;} lword MaxHeaderLength() const {return LWORD_MAX;} // 2^64-1 bytes lword MaxMessageLength() const {return W64LIT(274877906880);} // 2^38-1 blocks lword MaxFooterLength() const {return 0;} /// \brief Encrypts and calculates a MAC in one call /// \param ciphertext the encryption buffer /// \param mac the mac buffer /// \param macSize the size of the MAC buffer, in bytes /// \param iv the iv buffer /// \param ivLength the size of the IV buffer, in bytes /// \param aad the AAD buffer /// \param aadLength the size of the AAD buffer, in bytes /// \param message the message buffer /// \param messageLength the size of the messagetext buffer, in bytes /// \details EncryptAndAuthenticate() encrypts and generates the MAC in one call. The function /// truncates the MAC if macSize < TagSize(). virtual void EncryptAndAuthenticate(byte *ciphertext, byte *mac, size_t macSize, const byte *iv, int ivLength, const byte *aad, size_t aadLength, const byte *message, size_t messageLength); /// \brief Decrypts and verifies a MAC in one call /// \param message the decryption buffer /// \param mac the mac buffer /// \param macSize the size of the MAC buffer, in bytes /// \param iv the iv buffer /// \param ivLength the size of the IV buffer, in bytes /// \param aad the AAD buffer /// \param aadLength the size of the AAD buffer, in bytes /// \param ciphertext the cipher buffer /// \param ciphertextLength the size of the ciphertext buffer, in bytes /// \return true if the MAC is valid and the decoding succeeded, false otherwise /// \details DecryptAndVerify() decrypts and verifies the MAC in one call. /// message is a decryption buffer and should be at least as large as the ciphertext buffer. /// \details The function returns true iff MAC is valid. DecryptAndVerify() assumes the MAC /// is truncated if macLength < TagSize(). virtual bool DecryptAndVerify(byte *message, const byte *mac, size_t macSize, const byte *iv, int ivLength, const byte *aad, size_t aadLength, const byte *ciphertext, size_t ciphertextLength); protected: // AuthenticatedSymmetricCipherBase bool AuthenticationIsOnPlaintext() const {return false;} unsigned int AuthenticationBlockSize() const {return 1;} void SetKeyWithoutResync(const byte *userKey, size_t keylength, const NameValuePairs ¶ms); void Resync(const byte *iv, size_t len); size_t AuthenticateBlocks(const byte *data, size_t len); void AuthenticateLastHeaderBlock(); void AuthenticateLastConfidentialBlock(); void AuthenticateLastFooterBlock(byte *mac, size_t macSize); // See comments in chachapoly.cpp void RekeyCipherAndMac(const byte *userKey, size_t userKeyLength, const NameValuePairs ¶ms); virtual const MessageAuthenticationCode & GetMAC() const = 0; virtual MessageAuthenticationCode & AccessMAC() = 0; private: SecByteBlock m_userKey; }; /// \brief IETF ChaCha20Poly1305 cipher final implementation /// \tparam T_IsEncryption flag indicating cipher direction /// \details ChaCha20Poly1305 is an authenticated encryption scheme that combines /// ChaCha20TLS and Poly1305TLS. The scheme is defined in RFC 8439, section 2.8, /// AEAD_CHACHA20_POLY1305 construction, and uses the IETF versions of ChaCha20 /// and Poly1305. /// \sa RFC 8439, ChaCha20 and Poly1305 /// for IETF Protocols. /// \since Crypto++ 8.1 template class ChaCha20Poly1305_Final : public ChaCha20Poly1305_Base { public: virtual ~ChaCha20Poly1305_Final() {} protected: const SymmetricCipher & GetSymmetricCipher() {return const_cast(this)->AccessSymmetricCipher();} SymmetricCipher & AccessSymmetricCipher() {return m_cipher;} bool IsForwardTransformation() const {return T_IsEncryption;} const MessageAuthenticationCode & GetMAC() const {return const_cast(this)->AccessMAC();} MessageAuthenticationCode & AccessMAC() {return m_mac;} private: ChaChaTLS::Encryption m_cipher; Poly1305TLS m_mac; }; /// \brief IETF ChaCha20/Poly1305 AEAD scheme /// \details ChaCha20Poly1305 is an authenticated encryption scheme that combines /// ChaCha20TLS and Poly1305TLS. The scheme is defined in RFC 8439, section 2.8, /// AEAD_CHACHA20_POLY1305 construction, and uses the IETF versions of ChaCha20 /// and Poly1305. /// \sa RFC 8439, ChaCha20 and Poly1305 /// for IETF Protocols. /// \since Crypto++ 8.1 struct ChaCha20Poly1305 : public AuthenticatedSymmetricCipherDocumentation { /// \brief ChaCha20Poly1305 encryption typedef ChaCha20Poly1305_Final Encryption; /// \brief ChaCha20Poly1305 decryption typedef ChaCha20Poly1305_Final Decryption; }; ////////////////////////////// IETF XChaCha20 draft ////////////////////////////// /// \brief IETF XChaCha20Poly1305 cipher base implementation /// \details Base implementation of the AuthenticatedSymmetricCipher interface /// \since Crypto++ 8.1 class XChaCha20Poly1305_Base : public AuthenticatedSymmetricCipherBase { public: CRYPTOPP_STATIC_CONSTEXPR const char* StaticAlgorithmName() {return "XChaCha20/Poly1305";} virtual ~XChaCha20Poly1305_Base() {} // AuthenticatedSymmetricCipher std::string AlgorithmName() const {return std::string("XChaCha20/Poly1305");} std::string AlgorithmProvider() const {return GetSymmetricCipher().AlgorithmProvider();} size_t MinKeyLength() const {return 32;} size_t MaxKeyLength() const {return 32;} size_t DefaultKeyLength() const {return 32;} size_t GetValidKeyLength(size_t n) const {CRYPTOPP_UNUSED(n); return 32;} bool IsValidKeyLength(size_t n) const {return n==32;} unsigned int OptimalDataAlignment() const {return GetSymmetricCipher().OptimalDataAlignment();} IV_Requirement IVRequirement() const {return UNIQUE_IV;} unsigned int IVSize() const {return 24;} unsigned int MinIVLength() const {return 24;} unsigned int MaxIVLength() const {return 24;} unsigned int DigestSize() const {return 16;} lword MaxHeaderLength() const {return LWORD_MAX;} // 2^64-1 bytes lword MaxMessageLength() const {return W64LIT(274877906880);} // 2^38-1 blocks lword MaxFooterLength() const {return 0;} /// \brief Encrypts and calculates a MAC in one call /// \param ciphertext the encryption buffer /// \param mac the mac buffer /// \param macSize the size of the MAC buffer, in bytes /// \param iv the iv buffer /// \param ivLength the size of the IV buffer, in bytes /// \param aad the AAD buffer /// \param aadLength the size of the AAD buffer, in bytes /// \param message the message buffer /// \param messageLength the size of the messagetext buffer, in bytes /// \details EncryptAndAuthenticate() encrypts and generates the MAC in one call. The function /// truncates the MAC if macSize < TagSize(). virtual void EncryptAndAuthenticate(byte *ciphertext, byte *mac, size_t macSize, const byte *iv, int ivLength, const byte *aad, size_t aadLength, const byte *message, size_t messageLength); /// \brief Decrypts and verifies a MAC in one call /// \param message the decryption buffer /// \param mac the mac buffer /// \param macSize the size of the MAC buffer, in bytes /// \param iv the iv buffer /// \param ivLength the size of the IV buffer, in bytes /// \param aad the AAD buffer /// \param aadLength the size of the AAD buffer, in bytes /// \param ciphertext the cipher buffer /// \param ciphertextLength the size of the ciphertext buffer, in bytes /// \return true if the MAC is valid and the decoding succeeded, false otherwise /// \details DecryptAndVerify() decrypts and verifies the MAC in one call. /// message is a decryption buffer and should be at least as large as the ciphertext buffer. /// \details The function returns true iff MAC is valid. DecryptAndVerify() assumes the MAC /// is truncated if macLength < TagSize(). virtual bool DecryptAndVerify(byte *message, const byte *mac, size_t macSize, const byte *iv, int ivLength, const byte *aad, size_t aadLength, const byte *ciphertext, size_t ciphertextLength); protected: // AuthenticatedSymmetricCipherBase bool AuthenticationIsOnPlaintext() const {return false;} unsigned int AuthenticationBlockSize() const {return 1;} void SetKeyWithoutResync(const byte *userKey, size_t keylength, const NameValuePairs ¶ms); void Resync(const byte *iv, size_t len); size_t AuthenticateBlocks(const byte *data, size_t len); void AuthenticateLastHeaderBlock(); void AuthenticateLastConfidentialBlock(); void AuthenticateLastFooterBlock(byte *mac, size_t macSize); // See comments in chachapoly.cpp void RekeyCipherAndMac(const byte *userKey, size_t userKeyLength, const NameValuePairs ¶ms); virtual const MessageAuthenticationCode & GetMAC() const = 0; virtual MessageAuthenticationCode & AccessMAC() = 0; private: SecByteBlock m_userKey; }; /// \brief IETF XChaCha20Poly1305 cipher final implementation /// \tparam T_IsEncryption flag indicating cipher direction /// \details XChaCha20Poly1305 is an authenticated encryption scheme that combines /// XChaCha20 and Poly1305-TLS. The scheme is defined in RFC 8439, section 2.8, /// AEAD_CHACHA20_POLY1305 construction, and uses the IETF versions of ChaCha20 /// and Poly1305. /// \sa RFC 8439, ChaCha20 and Poly1305 /// for IETF Protocols. /// \since Crypto++ 8.1 template class XChaCha20Poly1305_Final : public XChaCha20Poly1305_Base { public: virtual ~XChaCha20Poly1305_Final() {} protected: const SymmetricCipher & GetSymmetricCipher() {return const_cast(this)->AccessSymmetricCipher();} SymmetricCipher & AccessSymmetricCipher() {return m_cipher;} bool IsForwardTransformation() const {return T_IsEncryption;} const MessageAuthenticationCode & GetMAC() const {return const_cast(this)->AccessMAC();} MessageAuthenticationCode & AccessMAC() {return m_mac;} private: XChaCha20::Encryption m_cipher; Poly1305TLS m_mac; }; /// \brief IETF XChaCha20/Poly1305 AEAD scheme /// \details XChaCha20Poly1305 is an authenticated encryption scheme that combines /// XChaCha20 and Poly1305-TLS. The scheme is defined in RFC 8439, section 2.8, /// AEAD_XCHACHA20_POLY1305 construction, and uses the IETF versions of ChaCha20 /// and Poly1305. /// \sa RFC 8439, ChaCha20 and Poly1305 /// for IETF Protocols. /// \since Crypto++ 8.1 struct XChaCha20Poly1305 : public AuthenticatedSymmetricCipherDocumentation { /// \brief XChaCha20Poly1305 encryption typedef XChaCha20Poly1305_Final Encryption; /// \brief XChaCha20Poly1305 decryption typedef XChaCha20Poly1305_Final Decryption; }; NAMESPACE_END #endif // CRYPTOPP_CHACHA_POLY1305_H