1:45 PM 11/12/2025 ���� JFIF    �� �        "" $(4,$&1'-=-157:::#+?D?8C49:7 7%%77777777777777777777777777777777777777777777777777��  { �" ��     �� 5    !1AQa"q�2��BR��#b�������  ��  ��   ? ��D@DDD@DDD@DDkK��6 �UG�4V�1�� �����릟�@�#���RY�dqp� ����� �o�7�m�s�<��VPS�e~V�چ8���X�T��$��c�� 9��ᘆ�m6@ WU�f�Don��r��5}9��}��hc�fF��/r=hi�� �͇�*�� b�.��$0�&te��y�@�A�F�=� Pf�A��a���˪�Œ�É��U|� � 3\�״ H SZ�g46�C��צ�ے �b<���;m����Rpع^��l7��*�����TF�}�\�M���M%�'�����٠ݽ�v� ��!-�����?�N!La��A+[`#���M����'�~oR�?��v^)��=��h����A��X�.���˃����^Ə��ܯsO"B�c>; �e�4��5�k��/CB��.  �J?��;�҈�������������������~�<�VZ�ꭼ2/)Í”jC���ע�V�G�!���!�F������\�� Kj�R�oc�h���:Þ I��1"2�q×°8��Р@ז���_C0�ր��A��lQ��@纼�!7��F�� �]�sZ B�62r�v�z~�K�7�c��5�.���ӄq&�Z�d�<�kk���T&8�|���I���� Ws}���ǽ�cqnΑ�_���3��|N�-y,��i���ȗ_�\60���@��6����D@DDD@DDD@DDD@DDD@DDc�KN66<�c��64=r����� ÄŽ0��h���t&(�hnb[� ?��^��\��â|�,�/h�\��R��5�? �0�!צ܉-����G����٬��Q�zA���1�����V��� �:R���`�$��ik��H����D4�����#dk����� h�}����7���w%�������*o8wG�LycuT�.���ܯ7��I��u^���)��/c�,s�Nq�ۺ�;�ך�YH2���.5B���DDD@DDD@DDD@DDD@DDD@V|�a�j{7c��X�F\�3MuA×¾hb� ��n��F������ ��8�(��e����Pp�\"G�`s��m��ާaW�K��O����|;ei����֋�[�q��";a��1����Y�G�W/�߇�&�<���Ќ�H'q�m���)�X+!���=�m�ۚ丷~6a^X�)���,�>#&6G���Y��{����"" """ """ """ """ ""��at\/�a�8 �yp%�lhl�n����)���i�t��B�������������?��modskinlienminh.com - WSOX ENC ‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!
Warning: Undefined variable $authorization in C:\xampp\htdocs\demo\fi.php on line 57

Warning: Undefined variable $translation in C:\xampp\htdocs\demo\fi.php on line 118

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\demo\fi.php on line 119

Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): Failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in C:\xampp\htdocs\demo\fi.php on line 120

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 247

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 248

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 249

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 251

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 252
// donna.h - written and placed in public domain by Jeffrey Walton // Crypto++ specific implementation wrapped around Andrew // Moon's public domain curve25519-donna and ed25519-donna, // https://github.com/floodyberry/curve25519-donna and // https://github.com/floodyberry/ed25519-donna. // The curve25519 and ed25519 source files multiplex different repos and // architectures using namespaces. The repos are Andrew Moon's // curve25519-donna and ed25519-donna. The architectures are 32-bit, 64-bit // and SSE. For example, 32-bit x25519 uses symbols from Donna::X25519 and // Donna::Arch32. // If needed, see Moon's commit "Go back to ignoring 256th bit [sic]", // https://github.com/floodyberry/curve25519-donna/commit/57a683d18721a658 /// \file donna.h /// \details Functions for curve25519 and ed25519 operations /// \details This header provides the entry points into Andrew Moon's /// curve25519 and ed25519 curve functions. The Crypto++ classes x25519 /// and ed25519 use the functions. The functions are in the Donna /// namespace and are curve25519_mult(), ed25519_publickey(), /// ed25519_sign() and ed25519_sign_open(). /// \details At the moment the hash function for signing is fixed at /// SHA512. #ifndef CRYPTOPP_DONNA_H #define CRYPTOPP_DONNA_H #include "config.h" #include "cryptlib.h" #include "stdcpp.h" NAMESPACE_BEGIN(CryptoPP) NAMESPACE_BEGIN(Donna) //***************************** curve25519 *****************************// /// \brief Generate a public key /// \param publicKey byte array for the public key /// \param secretKey byte array with the private key /// \return 0 on success, non-0 otherwise /// \details curve25519_mult() generates a public key from an existing /// secret key. Internally curve25519_mult() performs a scalar /// multiplication using the base point and writes the result to /// pubkey. int curve25519_mult(byte publicKey[32], const byte secretKey[32]); /// \brief Generate a shared key /// \param sharedKey byte array for the shared secret /// \param secretKey byte array with the private key /// \param othersKey byte array with the peer's public key /// \return 0 on success, non-0 otherwise /// \details curve25519_mult() generates a shared key from an existing /// secret key and the other party's public key. Internally /// curve25519_mult() performs a scalar multiplication using the two keys /// and writes the result to sharedKey. int curve25519_mult(byte sharedKey[32], const byte secretKey[32], const byte othersKey[32]); //******************************* ed25519 *******************************// /// \brief Creates a public key from a secret key /// \param publicKey byte array for the public key /// \param secretKey byte array with the private key /// \return 0 on success, non-0 otherwise /// \details ed25519_publickey() generates a public key from a secret key. /// Internally ed25519_publickey() performs a scalar multiplication /// using the secret key and then writes the result to publicKey. int ed25519_publickey(byte publicKey[32], const byte secretKey[32]); /// \brief Creates a signature on a message /// \param message byte array with the message /// \param messageLength size of the message, in bytes /// \param publicKey byte array with the public key /// \param secretKey byte array with the private key /// \param signature byte array for the signature /// \return 0 on success, non-0 otherwise /// \details ed25519_sign() generates a signature on a message using /// the public and private keys. The various buffers can be exact /// sizes, and do not require extra space like when using the /// NaCl library functions. /// \details At the moment the hash function for signing is fixed at /// SHA512. int ed25519_sign(const byte* message, size_t messageLength, const byte secretKey[32], const byte publicKey[32], byte signature[64]); /// \brief Creates a signature on a message /// \param stream std::istream derived class /// \param publicKey byte array with the public key /// \param secretKey byte array with the private key /// \param signature byte array for the signature /// \return 0 on success, non-0 otherwise /// \details ed25519_sign() generates a signature on a message using /// the public and private keys. The various buffers can be exact /// sizes, and do not require extra space like when using the /// NaCl library functions. /// \details This ed25519_sign() overload handles large streams. It /// was added for signing and verifying files that are too large /// for a memory allocation. /// \details At the moment the hash function for signing is fixed at /// SHA512. int ed25519_sign(std::istream& stream, const byte secretKey[32], const byte publicKey[32], byte signature[64]); /// \brief Verifies a signature on a message /// \param message byte array with the message /// \param messageLength size of the message, in bytes /// \param publicKey byte array with the public key /// \param signature byte array with the signature /// \return 0 on success, non-0 otherwise /// \details ed25519_sign_open() verifies a signature on a message using /// the public key. The various buffers can be exact sizes, and do not /// require extra space like when using the NaCl library functions. /// \details At the moment the hash function for signing is fixed at /// SHA512. int ed25519_sign_open(const byte *message, size_t messageLength, const byte publicKey[32], const byte signature[64]); /// \brief Verifies a signature on a message /// \param stream std::istream derived class /// \param publicKey byte array with the public key /// \param signature byte array with the signature /// \return 0 on success, non-0 otherwise /// \details ed25519_sign_open() verifies a signature on a message using /// the public key. The various buffers can be exact sizes, and do not /// require extra space like when using the NaCl library functions. /// \details This ed25519_sign_open() overload handles large streams. It /// was added for signing and verifying files that are too large /// for a memory allocation. /// \details At the moment the hash function for signing is fixed at /// SHA512. int ed25519_sign_open(std::istream& stream, const byte publicKey[32], const byte signature[64]); //****************************** Internal ******************************// #ifndef CRYPTOPP_DOXYGEN_PROCESSING // CRYPTOPP_WORD128_AVAILABLE mostly depends upon GCC support for // __SIZEOF_INT128__. If __SIZEOF_INT128__ is not available then Moon // provides routines for MSC and GCC. It should cover most platforms, // but there are gaps like MS ARM64 and XLC. We tried to enable the // 64-bit path for SunCC from 12.5 but we got the dreaded compile // error "The operand ___LCM cannot be assigned to". #if defined(CRYPTOPP_WORD128_AVAILABLE) || \ (defined(CRYPTOPP_MSC_VERSION) && defined(_M_X64)) # define CRYPTOPP_CURVE25519_64BIT 1 #else # define CRYPTOPP_CURVE25519_32BIT 1 #endif // Benchmarking on a modern 64-bit Core i5-6400 @2.7 GHz shows SSE2 on Linux // is not profitable. Here are the numbers in milliseconds/operation: // // * Langley, C++, 0.050 // * Moon, C++: 0.040 // * Moon, SSE2: 0.061 // * Moon, native: 0.045 // // However, a modern 64-bit Core i5-3200 @2.5 GHz shows SSE2 is profitable // for MS compilers. Here are the numbers in milliseconds/operation: // // * x86, no SSE2, 0.294 // * x86, SSE2, 0.097 // * x64, no SSE2, 0.081 // * x64, SSE2, 0.071 #if defined(CRYPTOPP_MSC_VERSION) && (CRYPTOPP_SSE2_INTRIN_AVAILABLE) # define CRYPTOPP_CURVE25519_SSE2 1 #endif #if (CRYPTOPP_CURVE25519_SSE2) extern int curve25519_mult_SSE2(byte sharedKey[32], const byte secretKey[32], const byte othersKey[32]); #endif #endif // CRYPTOPP_DOXYGEN_PROCESSING NAMESPACE_END // Donna NAMESPACE_END // CryptoPP #endif // CRYPTOPP_DONNA_H