Enter the passphrase to be encrypted.
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with MD2:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with MD4:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with MD5:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SHA1:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SHA224:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SHA256:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SHA384:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SHA512:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with RIPEMD128:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with RIPEMD160:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with RIPEMD256:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with RIPEMD320:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with WHIRLPOOL:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with TIGER128,3:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with TIGER160,3:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with TIGER192,3:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with TIGER128,4:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with TIGER160,4:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with TIGER192,4:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SNEFRU:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SNEFRU256:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with GOST:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with GOST-CRYPTO:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with ADLER32:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with CRC32:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with CRC32B:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with FNV132:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with FNV1A32:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with FNV164:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with FNV1A64:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with JOAAT:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL128,3:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL160,3:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL192,3:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL224,3:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL256,3:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL128,4:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL160,4:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL192,4:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL224,4:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL256,4:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL128,5:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL160,5:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL192,5:
Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL224,5: