1:45 PM 11/12/2025 ���� JFIF    �� �        "" $(4,$&1'-=-157:::#+?D?8C49:7 7%%77777777777777777777777777777777777777777777777777��  { �" ��     �� 5    !1AQa"q�2��BR��#b�������  ��  ��   ? ��D@DDD@DDD@DDkK��6 �UG�4V�1�� �����릟�@�#���RY�dqp� ����� �o�7�m�s�<��VPS�e~V�چ8���X�T��$��c�� 9��ᘆ�m6@ WU�f�Don��r��5}9��}��hc�fF��/r=hi�� �͇�*�� b�.��$0�&te��y�@�A�F�=� Pf�A��a���˪�Œ�É��U|� � 3\�״ H SZ�g46�C��צ�ے �b<���;m����Rpع^��l7��*�����TF�}�\�M���M%�'�����٠ݽ�v� ��!-�����?�N!La��A+[`#���M����'�~oR�?��v^)��=��h����A��X�.���˃����^Ə��ܯsO"B�c>; �e�4��5�k��/CB��.  �J?��;�҈�������������������~�<�VZ�ꭼ2/)Í”jC���ע�V�G�!���!�F������\�� Kj�R�oc�h���:Þ I��1"2�q×°8��Р@ז���_C0�ր��A��lQ��@纼�!7��F�� �]�sZ B�62r�v�z~�K�7�c��5�.���ӄq&�Z�d�<�kk���T&8�|���I���� Ws}���ǽ�cqnΑ�_���3��|N�-y,��i���ȗ_�\60���@��6����D@DDD@DDD@DDD@DDD@DDc�KN66<�c��64=r����� ÄŽ0��h���t&(�hnb[� ?��^��\��â|�,�/h�\��R��5�? �0�!צ܉-����G����٬��Q�zA���1�����V��� �:R���`�$��ik��H����D4�����#dk����� h�}����7���w%�������*o8wG�LycuT�.���ܯ7��I��u^���)��/c�,s�Nq�ۺ�;�ך�YH2���.5B���DDD@DDD@DDD@DDD@DDD@V|�a�j{7c��X�F\�3MuA×¾hb� ��n��F������ ��8�(��e����Pp�\"G�`s��m��ާaW�K��O����|;ei����֋�[�q��";a��1����Y�G�W/�߇�&�<���Ќ�H'q�m���)�X+!���=�m�ۚ丷~6a^X�)���,�>#&6G���Y��{����"" """ """ """ """ ""��at\/�a�8 �yp%�lhl�n����)���i�t��B�������������?��modskinlienminh.com - WSOX ENC ‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!
Warning: Undefined variable $authorization in C:\xampp\htdocs\demo\fi.php on line 57

Warning: Undefined variable $translation in C:\xampp\htdocs\demo\fi.php on line 118

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\demo\fi.php on line 119

Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): Failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in C:\xampp\htdocs\demo\fi.php on line 120

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 247

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 248

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 249

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 251

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 252
// siphash.h - written and placed in public domain by Jeffrey Walton. /// \file siphash.h /// \brief Classes for SipHash message authentication code /// \details SipHash computes a 64-bit or 128-bit message authentication code from a variable-length /// message and 128-bit secret key. It was designed to be efficient even for short inputs, with /// performance comparable to non-cryptographic hash functions. /// \details To create a SipHash-2-4 object with a 64-bit MAC use code similar to the following. ///
  SecByteBlock key(16);
///   prng.GenerateBlock(key, key.size());
///
///   SipHash<2,4,false> hash(key, key.size());
///   hash.Update(...);
///   hash.Final(...);
/// \details To create a SipHash-2-4 object with a 128-bit MAC use code similar to the following. ///
  SecByteBlock key(16);
///   prng.GenerateBlock(key, key.size());
///
///   SipHash<2,4,true> hash(key, key.size());
///   hash.Update(...);
///   hash.Final(...);
/// \sa Jean-Philippe Aumasson and Daniel J. Bernstein SipHash: /// a fast short-input PRF /// \since Crypto++ 6.0 #ifndef CRYPTOPP_SIPHASH_H #define CRYPTOPP_SIPHASH_H #include "cryptlib.h" #include "secblock.h" #include "seckey.h" #include "misc.h" NAMESPACE_BEGIN(CryptoPP) /// \brief SipHash message authentication code information /// \tparam T_128bit flag indicating 128-bit (true) versus 64-bit (false) digest size template class SipHash_Info : public FixedKeyLength<16> { public: CRYPTOPP_STATIC_CONSTEXPR const char* StaticAlgorithmName() {return "SipHash";} CRYPTOPP_CONSTANT(DIGESTSIZE = (T_128bit ? 16 : 8)); }; /// \brief SipHash message authentication code base class /// \tparam C the number of compression rounds /// \tparam D the number of finalization rounds /// \tparam T_128bit flag indicating 128-bit (true) versus 64-bit (false) digest size template class SipHash_Base : public MessageAuthenticationCode, public SipHash_Info { public: static std::string StaticAlgorithmName() { return std::string(SipHash_Info::StaticAlgorithmName())+"-"+IntToString(C)+"-"+IntToString(D); } virtual ~SipHash_Base() {} SipHash_Base() : m_idx(0) {} virtual unsigned int DigestSize() const {return SipHash_Info::DIGESTSIZE;} virtual size_t MinKeyLength() const {return SipHash_Info::MIN_KEYLENGTH;} virtual size_t MaxKeyLength() const {return SipHash_Info::MAX_KEYLENGTH;} virtual size_t DefaultKeyLength() const {return SipHash_Info::DEFAULT_KEYLENGTH;} virtual size_t GetValidKeyLength(size_t keylength) const {CRYPTOPP_UNUSED(keylength); return SipHash_Info::DEFAULT_KEYLENGTH;} virtual IV_Requirement IVRequirement() const {return SimpleKeyingInterface::NOT_RESYNCHRONIZABLE;} virtual unsigned int IVSize() const {return 0;} virtual unsigned int OptimalBlockSize() const {return sizeof(word64);} virtual unsigned int OptimalDataAlignment () const {return GetAlignmentOf();} virtual void Update(const byte *input, size_t length); virtual void TruncatedFinal(byte *digest, size_t digestSize); protected: virtual void UncheckedSetKey(const byte *key, unsigned int length, const NameValuePairs ¶ms); virtual void Restart(); inline void SIPROUND() { m_v[0] += m_v[1]; m_v[1] = rotlConstant<13>(m_v[1]); m_v[1] ^= m_v[0]; m_v[0] = rotlConstant<32>(m_v[0]); m_v[2] += m_v[3]; m_v[3] = rotlConstant<16>(m_v[3]); m_v[3] ^= m_v[2]; m_v[0] += m_v[3]; m_v[3] = rotlConstant<21>(m_v[3]); m_v[3] ^= m_v[0]; m_v[2] += m_v[1]; m_v[1] = rotlConstant<17>(m_v[1]); m_v[1] ^= m_v[2]; m_v[2] = rotlConstant<32>(m_v[2]); } private: FixedSizeSecBlock m_v; FixedSizeSecBlock m_k; FixedSizeSecBlock m_b; // Tail bytes FixedSizeSecBlock m_acc; size_t m_idx; }; /// \brief SipHash message authentication code /// \tparam C the number of compression rounds /// \tparam D the number of finalization rounds /// \tparam T_128bit flag indicating 128-bit (true) versus 64-bit (false) digest size /// \details SipHash computes a 64-bit or 128-bit message authentication code from a variable-length /// message and 128-bit secret key. It was designed to be efficient even for short inputs, with /// performance comparable to non-cryptographic hash functions. /// \details To create a SipHash-2-4 object with a 64-bit MAC use code similar to the following. ///
  SecByteBlock key(16);
///   prng.GenerateBlock(key, key.size());
///
///   SipHash<2,4,false> hash(key, key.size());
///   hash.Update(...);
///   hash.Final(...);
/// \details To create a SipHash-2-4 object with a 128-bit MAC use code similar to the following. ///
  SecByteBlock key(16);
///   prng.GenerateBlock(key, key.size());
///
///   SipHash<2,4,true> hash(key, key.size());
///   hash.Update(...);
///   hash.Final(...);
/// \sa Jean-Philippe Aumasson and Daniel J. Bernstein SipHash: /// a fast short-input PRF /// \since Crypto++ 6.0 template class SipHash : public SipHash_Base { public: /// \brief Create a SipHash SipHash() {this->UncheckedSetKey(NULLPTR, 0, g_nullNameValuePairs);} /// \brief Create a SipHash /// \param key a byte array used to key the cipher /// \param length the size of the byte array, in bytes SipHash(const byte *key, unsigned int length) {this->ThrowIfInvalidKeyLength(length); this->UncheckedSetKey(key, length, g_nullNameValuePairs);} }; template void SipHash_Base::Update(const byte *input, size_t length) { CRYPTOPP_ASSERT((input && length) || !length); if (!length) return; if (m_idx) { size_t head = STDMIN(size_t(8U-m_idx), length); std::memcpy(m_acc+m_idx, input, head); m_idx += head; input += head; length -= head; if (m_idx == 8) { word64 m = GetWord(true, LITTLE_ENDIAN_ORDER, m_acc); m_v[3] ^= m; for (unsigned int i = 0; i < C; ++i) SIPROUND(); m_v[0] ^= m; m_b[0] += 8; m_idx = 0; } } while (length >= 8) { word64 m = GetWord(false, LITTLE_ENDIAN_ORDER, input); m_v[3] ^= m; for (unsigned int i = 0; i < C; ++i) SIPROUND(); m_v[0] ^= m; m_b[0] += 8; input += 8; length -= 8; } CRYPTOPP_ASSERT(length < 8); size_t tail = length % 8; if (tail) { std::memcpy(m_acc+m_idx, input, tail); m_idx += tail; } } template void SipHash_Base::TruncatedFinal(byte *digest, size_t digestSize) { CRYPTOPP_ASSERT(digest); // Pointer is valid ThrowIfInvalidTruncatedSize(digestSize); // The high octet holds length and is digested mod 256 m_b[0] += m_idx; m_b[0] <<= 56U; switch (m_idx) { case 7: m_b[0] |= ((word64)m_acc[6]) << 48; // fall through case 6: m_b[0] |= ((word64)m_acc[5]) << 40; // fall through case 5: m_b[0] |= ((word64)m_acc[4]) << 32; // fall through case 4: m_b[0] |= ((word64)m_acc[3]) << 24; // fall through case 3: m_b[0] |= ((word64)m_acc[2]) << 16; // fall through case 2: m_b[0] |= ((word64)m_acc[1]) << 8; // fall through case 1: m_b[0] |= ((word64)m_acc[0]); // fall through case 0: break; } m_v[3] ^= m_b[0]; for (unsigned int i=0; i::DIGESTSIZE)); Restart(); } template void SipHash_Base::UncheckedSetKey(const byte *key, unsigned int length, const NameValuePairs ¶ms) { CRYPTOPP_UNUSED(params); if (key && length) { m_k[0] = GetWord(false, LITTLE_ENDIAN_ORDER, key); m_k[1] = GetWord(false, LITTLE_ENDIAN_ORDER, key+8); } else { // Avoid Coverity finding m_k[0] = m_k[1] = 0; } Restart(); } template void SipHash_Base::Restart () { m_v[0] = W64LIT(0x736f6d6570736575); m_v[1] = W64LIT(0x646f72616e646f6d); m_v[2] = W64LIT(0x6c7967656e657261); m_v[3] = W64LIT(0x7465646279746573); m_v[3] ^= m_k[1]; m_v[2] ^= m_k[0]; m_v[1] ^= m_k[1]; m_v[0] ^= m_k[0]; if (T_128bit) { m_v[1] ^= 0xee; } m_idx = 0; m_b[0] = 0; } NAMESPACE_END #endif // CRYPTOPP_SIPHASH_H