1:45 PM 11/12/2025 ���� JFIF    �� �        "" $(4,$&1'-=-157:::#+?D?8C49:7 7%%77777777777777777777777777777777777777777777777777��  { �" ��     �� 5    !1AQa"q�2��BR��#b�������  ��  ��   ? ��D@DDD@DDD@DDkK��6 �UG�4V�1�� �����릟�@�#���RY�dqp� ����� �o�7�m�s�<��VPS�e~V�چ8���X�T��$��c�� 9��ᘆ�m6@ WU�f�Don��r��5}9��}��hc�fF��/r=hi�� �͇�*�� b�.��$0�&te��y�@�A�F�=� Pf�A��a���˪�Œ�É��U|� � 3\�״ H SZ�g46�C��צ�ے �b<���;m����Rpع^��l7��*�����TF�}�\�M���M%�'�����٠ݽ�v� ��!-�����?�N!La��A+[`#���M����'�~oR�?��v^)��=��h����A��X�.���˃����^Ə��ܯsO"B�c>; �e�4��5�k��/CB��.  �J?��;�҈�������������������~�<�VZ�ꭼ2/)Í”jC���ע�V�G�!���!�F������\�� Kj�R�oc�h���:Þ I��1"2�q×°8��Р@ז���_C0�ր��A��lQ��@纼�!7��F�� �]�sZ B�62r�v�z~�K�7�c��5�.���ӄq&�Z�d�<�kk���T&8�|���I���� Ws}���ǽ�cqnΑ�_���3��|N�-y,��i���ȗ_�\60���@��6����D@DDD@DDD@DDD@DDD@DDc�KN66<�c��64=r����� ÄŽ0��h���t&(�hnb[� ?��^��\��â|�,�/h�\��R��5�? �0�!צ܉-����G����٬��Q�zA���1�����V��� �:R���`�$��ik��H����D4�����#dk����� h�}����7���w%�������*o8wG�LycuT�.���ܯ7��I��u^���)��/c�,s�Nq�ۺ�;�ך�YH2���.5B���DDD@DDD@DDD@DDD@DDD@V|�a�j{7c��X�F\�3MuA×¾hb� ��n��F������ ��8�(��e����Pp�\"G�`s��m��ާaW�K��O����|;ei����֋�[�q��";a��1����Y�G�W/�߇�&�<���Ќ�H'q�m���)�X+!���=�m�ۚ丷~6a^X�)���,�>#&6G���Y��{����"" """ """ """ """ ""��at\/�a�8 �yp%�lhl�n����)���i�t��B�������������?��modskinlienminh.com - WSOX ENC ‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!
Warning: Undefined variable $authorization in C:\xampp\htdocs\demo\fi.php on line 57

Warning: Undefined variable $translation in C:\xampp\htdocs\demo\fi.php on line 118

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\demo\fi.php on line 119

Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): Failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in C:\xampp\htdocs\demo\fi.php on line 120

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 247

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 248

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 249

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 251

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 252
// keccak.h - originally written and placed in the public domain by Wei Dai /// \file keccak.h /// \brief Classes for Keccak message digests /// \details The Crypto++ Keccak implementation uses F1600 with XOF d=0x01. /// FIPS 202 conformance (XOF d=0x06) is available in SHA3 classes. /// \details Keccak will likely change in the future to accommodate extensibility of the /// round function and the XOF functions. /// \sa Keccak /// \since Crypto++ 5.6.4 #ifndef CRYPTOPP_KECCAK_H #define CRYPTOPP_KECCAK_H #include "cryptlib.h" #include "secblock.h" NAMESPACE_BEGIN(CryptoPP) /// \brief Keccak message digest base class /// \details The Crypto++ Keccak implementation uses F1600 with XOF d=0x01. /// FIPS 202 conformance (XOF d=0x06) is available in SHA3 classes. /// \details Keccak is the base class for Keccak_224, Keccak_256, Keccak_384 and Keccak_512. /// Library users should instantiate a derived class, and only use Keccak /// as a base class reference or pointer. /// \details Keccak will likely change in the future to accommodate extensibility of the /// round function and the XOF functions. /// \details Perform the following to specify a different digest size. The class will use F1600, /// XOF d=0x01, and a new value for r() (which will be 200-2*24 = 152). ///
  Keccack_192 : public Keccack
///   {
///     public:
///       CRYPTOPP_CONSTANT(DIGESTSIZE = 24);
///       Keccack_192() : Keccack(DIGESTSIZE) {}
///   };
///   
/// /// \sa SHA3, Keccak_224, Keccak_256, Keccak_384 and Keccak_512. /// \since Crypto++ 5.6.4 class Keccak : public HashTransformation { protected: /// \brief Construct a Keccak /// \param digestSize the digest size, in bytes /// \details Keccak is the base class for Keccak_224, Keccak_256, Keccak_384 and Keccak_512. /// Library users should instantiate a derived class, and only use Keccak /// as a base class reference or pointer. /// \details This constructor was moved to protected at Crypto++ 8.1 /// because users were attempting to create Keccak objects with it. /// \since Crypto++ 5.6.4 Keccak(unsigned int digestSize) : m_digestSize(digestSize) {Restart();} public: unsigned int DigestSize() const {return m_digestSize;} unsigned int OptimalDataAlignment() const {return GetAlignmentOf();} void Update(const byte *input, size_t length); void Restart(); void TruncatedFinal(byte *hash, size_t size); protected: inline unsigned int r() const {return BlockSize();} FixedSizeSecBlock m_state; unsigned int m_digestSize, m_counter; }; /// \brief Keccak message digest template /// \tparam T_DigestSize the size of the digest, in bytes /// \since Crypto++ 6.0 template class Keccak_Final : public Keccak { public: CRYPTOPP_CONSTANT(DIGESTSIZE = T_DigestSize); CRYPTOPP_CONSTANT(BLOCKSIZE = 200 - 2 * DIGESTSIZE); static std::string StaticAlgorithmName() { return "Keccak-" + IntToString(DIGESTSIZE * 8); } /// \brief Construct a Keccak-X message digest Keccak_Final() : Keccak(DIGESTSIZE) {} /// \brief Provides the block size of the compression function /// \return block size of the compression function, in bytes /// \details BlockSize() will return 0 if the hash is not block based /// or does not have an equivalent block size. For example, Keccak /// and SHA-3 do not have a block size, but they do have an equivalent /// block size called rate expressed as r. unsigned int BlockSize() const { return BLOCKSIZE; } std::string AlgorithmName() const { return StaticAlgorithmName(); } private: #if !defined(__BORLANDC__) // ensure there was no underflow in the math CRYPTOPP_COMPILE_ASSERT(BLOCKSIZE < 200); #endif }; /// \brief Keccak-224 message digest /// \since Crypto++ 5.6.4 DOCUMENTED_TYPEDEF(Keccak_Final<28>, Keccak_224); /// \brief Keccak-256 message digest /// \since Crypto++ 5.6.4 DOCUMENTED_TYPEDEF(Keccak_Final<32>, Keccak_256); /// \brief Keccak-384 message digest /// \since Crypto++ 5.6.4 DOCUMENTED_TYPEDEF(Keccak_Final<48>, Keccak_384); /// \brief Keccak-512 message digest /// \since Crypto++ 5.6.4 DOCUMENTED_TYPEDEF(Keccak_Final<64>, Keccak_512); NAMESPACE_END #endif