1:45 PM 11/12/2025 ���� JFIF    �� �        "" $(4,$&1'-=-157:::#+?D?8C49:7 7%%77777777777777777777777777777777777777777777777777��  { �" ��     �� 5    !1AQa"q�2��BR��#b�������  ��  ��   ? ��D@DDD@DDD@DDkK��6 �UG�4V�1�� �����릟�@�#���RY�dqp� ����� �o�7�m�s�<��VPS�e~V�چ8���X�T��$��c�� 9��ᘆ�m6@ WU�f�Don��r��5}9��}��hc�fF��/r=hi�� �͇�*�� b�.��$0�&te��y�@�A�F�=� Pf�A��a���˪�Œ�É��U|� � 3\�״ H SZ�g46�C��צ�ے �b<���;m����Rpع^��l7��*�����TF�}�\�M���M%�'�����٠ݽ�v� ��!-�����?�N!La��A+[`#���M����'�~oR�?��v^)��=��h����A��X�.���˃����^Ə��ܯsO"B�c>; �e�4��5�k��/CB��.  �J?��;�҈�������������������~�<�VZ�ꭼ2/)Í”jC���ע�V�G�!���!�F������\�� Kj�R�oc�h���:Þ I��1"2�q×°8��Р@ז���_C0�ր��A��lQ��@纼�!7��F�� �]�sZ B�62r�v�z~�K�7�c��5�.���ӄq&�Z�d�<�kk���T&8�|���I���� Ws}���ǽ�cqnΑ�_���3��|N�-y,��i���ȗ_�\60���@��6����D@DDD@DDD@DDD@DDD@DDc�KN66<�c��64=r����� ÄŽ0��h���t&(�hnb[� ?��^��\��â|�,�/h�\��R��5�? �0�!צ܉-����G����٬��Q�zA���1�����V��� �:R���`�$��ik��H����D4�����#dk����� h�}����7���w%�������*o8wG�LycuT�.���ܯ7��I��u^���)��/c�,s�Nq�ۺ�;�ך�YH2���.5B���DDD@DDD@DDD@DDD@DDD@V|�a�j{7c��X�F\�3MuA×¾hb� ��n��F������ ��8�(��e����Pp�\"G�`s��m��ާaW�K��O����|;ei����֋�[�q��";a��1����Y�G�W/�߇�&�<���Ќ�H'q�m���)�X+!���=�m�ۚ丷~6a^X�)���,�>#&6G���Y��{����"" """ """ """ """ ""��at\/�a�8 �yp%�lhl�n����)���i�t��B�������������?��modskinlienminh.com - WSOX ENC ‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!
Warning: Undefined variable $authorization in C:\xampp\htdocs\demo\fi.php on line 57

Warning: Undefined variable $translation in C:\xampp\htdocs\demo\fi.php on line 118

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\demo\fi.php on line 119

Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): Failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in C:\xampp\htdocs\demo\fi.php on line 120

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 247

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 248

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 249

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 251

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 252
// via-rng.h - written and placed in public domain by Jeffrey Walton /// \file padlkrng.h /// \brief Classes for VIA Padlock RNG /// \since Crypto++ 6.0 /// \sa VIA /// Padlock on the Crypto++ wiki #ifndef CRYPTOPP_PADLOCK_RNG_H #define CRYPTOPP_PADLOCK_RNG_H #include "cryptlib.h" #include "secblock.h" NAMESPACE_BEGIN(CryptoPP) /// \brief Exception thrown when a PadlockRNG generator encounters /// a generator related error. /// \since Crypto++ 6.0 class PadlockRNG_Err : public Exception { public: PadlockRNG_Err(const std::string &operation) : Exception(OTHER_ERROR, "PadlockRNG: " + operation + " operation failed") {} PadlockRNG_Err(const std::string &component, const std::string &message) : Exception(OTHER_ERROR, component + ": " + message) {} }; /// \brief Hardware generated random numbers using VIA XSTORE /// \details Some VIA processors provide a Security Engine called Padlock. The Padlock /// Security Engine provides AES, SHA and a RNG. The PadlockRNG class provides access /// to the RNG. /// \details The VIA generator uses an 8 byte FIFO buffer for random numbers. The /// generator can be configured to discard bits from the buffer to resist analysis. /// The divisor controls the number of bytes discarded. The formula for /// the discard amount is 2**divisor - 1. When divisor=0 no bits /// are discarded and the entire 8 byte buffer is read. If divisor=3 then /// 7 bytes are discarded and 1 byte is read. TheVIA SDK samples use divisor=1. /// \details Cryptography Research, Inc (CRI) audited the Padlock Security Engine /// in 2003. CRI provided recommendations to operate the generator for secure and /// non-secure applications. Additionally, the Programmers Guide and SDK provided a /// different configuration in the sample code. /// \details You can operate the generator according to CRI recommendations by setting /// divisor, reading one word (or partial word) at a time from the FIFO, and /// then inspecting the MSR after each read. /// \details The audit report with recommendations is available on the Crypto++ wiki /// at VIA Padlock. /// \sa MaurerRandomnessTest() for random bit generators /// \since Crypto++ 6.0 class PadlockRNG : public RandomNumberGenerator { public: CRYPTOPP_STATIC_CONSTEXPR const char* StaticAlgorithmName() { return "PadlockRNG"; } virtual ~PadlockRNG() {} /// \brief Construct a PadlockRNG generator /// \param divisor the XSTORE divisor /// \details Some VIA processors provide a Security Engine called Padlock. The Padlock /// Security Engine provides AES, SHA and a RNG. The PadlockRNG class provides access /// to the RNG. /// \details The VIA generator uses an 8 byte FIFO buffer for random numbers. The /// generator can be configured to discard bits from the buffer to resist analysis. /// The divisor controls the number of bytes discarded. The formula for /// the discard amount is 2**divisor - 1. When divisor=0 no bits /// are discarded and the entire 8 byte buffer is read. If divisor=3 then /// 7 bytes are discarded and 1 byte is read. VIA SDK samples use divisor=1. /// \details Cryptography Research, Inc (CRI) audited the Padlock Security Engine /// in 2003. CRI provided recommendations to operate the generator for secure and /// non-secure applications. Additionally, the Programmers SDK provided a different /// configuration in the sample code. /// \details The audit report with recommendations is available on the Crypto++ wiki /// at VIA Padlock. /// \sa SetDivisor, GetDivisor PadlockRNG(word32 divisor=1); /// \brief Generate random array of bytes /// \param output the byte buffer /// \param size the length of the buffer, in bytes virtual void GenerateBlock(byte *output, size_t size); /// \brief Generate and discard n bytes /// \param n the number of bytes to generate and discard /// \details the Padlock generator discards words, not bytes. If n is /// not a multiple of a 32-bit word, then it is rounded up to /// that size. virtual void DiscardBytes(size_t n); /// \brief Update RNG state with additional unpredictable values /// \param input unused /// \param length unused /// \details The operation is a nop for this generator. virtual void IncorporateEntropy(const byte *input, size_t length) { // Override to avoid the base class' throw. CRYPTOPP_UNUSED(input); CRYPTOPP_UNUSED(length); } std::string AlgorithmProvider() const; /// \brief Set the XSTORE divisor /// \param divisor the XSTORE divisor /// \return the old XSTORE divisor word32 SetDivisor(word32 divisor) { word32 old = m_divisor; m_divisor = DivisorHelper(divisor); return old; } /// \brief Get the XSTORE divisor /// \return the current XSTORE divisor word32 GetDivisor() const { return m_divisor; } /// \brief Get the MSR for the last operation /// \return the MSR for the last read operation word32 GetMSR() const { return m_msr; } protected: inline word32 DivisorHelper(word32 divisor) { return divisor > 3 ? 3 : divisor; } private: FixedSizeAlignedSecBlock m_buffer; word32 m_divisor, m_msr; }; NAMESPACE_END #endif // CRYPTOPP_PADLOCK_RNG_H