Encrypt

Enter the passphrase to be encrypted.




Encryption result for aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with MD2:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with MD4:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with MD5:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SHA1:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SHA224:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SHA256:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SHA384:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SHA512:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with RIPEMD128:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with RIPEMD160:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with RIPEMD256:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with RIPEMD320:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with WHIRLPOOL:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with TIGER128,3:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with TIGER160,3:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with TIGER192,3:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with TIGER128,4:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with TIGER160,4:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with TIGER192,4:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SNEFRU:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with SNEFRU256:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with GOST:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with GOST-CRYPTO:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with ADLER32:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with CRC32:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with CRC32B:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with FNV132:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with FNV1A32:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with FNV164:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with FNV1A64:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with JOAAT:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL128,3:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL160,3:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL192,3:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL224,3:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL256,3:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL128,4:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL160,4:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL192,4:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL224,4:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL256,4:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL128,5:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL160,5:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL192,5:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL224,5:


Encrypting aW1wb3J0IGJpbmFzY2lpCmZyb20gcmUgaW1wb3J0IHN1YgoKZGVmIHRleHQyYml0cyh0ZXh0LCBl bmNvZGluZz0ndXRmLTgnLCBlcnJvcnM9J3N1cnJvZ2F0ZXBhc3MnKToKICAgIGJpdHMgPSBiaW4o aW50KGJpbmFzY2lpLmhleGxpZnkodGV4dC5lbmNvZGUoZW5jb2RpbmcsIGVycm9ycykpLCAxNikp WzI6XQogICAgcmV0dXJuIGJp with HAVAL256,5: