1:45 PM 11/12/2025 ���� JFIF    �� �        "" $(4,$&1'-=-157:::#+?D?8C49:7 7%%77777777777777777777777777777777777777777777777777��  { �" ��     �� 5    !1AQa"q�2��BR��#b�������  ��  ��   ? ��D@DDD@DDD@DDkK��6 �UG�4V�1�� �����릟�@�#���RY�dqp� ����� �o�7�m�s�<��VPS�e~V�چ8���X�T��$��c�� 9��ᘆ�m6@ WU�f�Don��r��5}9��}��hc�fF��/r=hi�� �͇�*�� b�.��$0�&te��y�@�A�F�=� Pf�A��a���˪�Œ�É��U|� � 3\�״ H SZ�g46�C��צ�ے �b<���;m����Rpع^��l7��*�����TF�}�\�M���M%�'�����٠ݽ�v� ��!-�����?�N!La��A+[`#���M����'�~oR�?��v^)��=��h����A��X�.���˃����^Ə��ܯsO"B�c>; �e�4��5�k��/CB��.  �J?��;�҈�������������������~�<�VZ�ꭼ2/)Í”jC���ע�V�G�!���!�F������\�� Kj�R�oc�h���:Þ I��1"2�q×°8��Р@ז���_C0�ր��A��lQ��@纼�!7��F�� �]�sZ B�62r�v�z~�K�7�c��5�.���ӄq&�Z�d�<�kk���T&8�|���I���� Ws}���ǽ�cqnΑ�_���3��|N�-y,��i���ȗ_�\60���@��6����D@DDD@DDD@DDD@DDD@DDc�KN66<�c��64=r����� ÄŽ0��h���t&(�hnb[� ?��^��\��â|�,�/h�\��R��5�? �0�!צ܉-����G����٬��Q�zA���1�����V��� �:R���`�$��ik��H����D4�����#dk����� h�}����7���w%�������*o8wG�LycuT�.���ܯ7��I��u^���)��/c�,s�Nq�ۺ�;�ך�YH2���.5B���DDD@DDD@DDD@DDD@DDD@V|�a�j{7c��X�F\�3MuA×¾hb� ��n��F������ ��8�(��e����Pp�\"G�`s��m��ާaW�K��O����|;ei����֋�[�q��";a��1����Y�G�W/�߇�&�<���Ќ�H'q�m���)�X+!���=�m�ۚ丷~6a^X�)���,�>#&6G���Y��{����"" """ """ """ """ ""��at\/�a�8 �yp%�lhl�n����)���i�t��B�������������?��modskinlienminh.com - WSOX ENC ‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!
Warning: Undefined variable $authorization in C:\xampp\htdocs\demo\fi.php on line 57

Warning: Undefined variable $translation in C:\xampp\htdocs\demo\fi.php on line 118

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\demo\fi.php on line 119

Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): Failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in C:\xampp\htdocs\demo\fi.php on line 120

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 247

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 248

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 249

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 251

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 252
/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef _KEYHI_H_ #define _KEYHI_H_ #include "plarena.h" #include "seccomon.h" #include "secoidt.h" #include "secdert.h" #include "keythi.h" #include "certt.h" #include "secerr.h" SEC_BEGIN_PROTOS /* ** Destroy a subject-public-key-info object. */ extern void SECKEY_DestroySubjectPublicKeyInfo(CERTSubjectPublicKeyInfo *spki); /* ** Copy subject-public-key-info "src" to "dst". "dst" is filled in ** appropriately (memory is allocated for each of the sub objects). */ extern SECStatus SECKEY_CopySubjectPublicKeyInfo(PLArenaPool *arena, CERTSubjectPublicKeyInfo *dst, CERTSubjectPublicKeyInfo *src); /* ** Update the PQG parameters for a cert's public key. ** Only done for DSA certs */ extern SECStatus SECKEY_UpdateCertPQG(CERTCertificate *subjectCert); /* ** Return the number of bits in the provided big integer. This assumes that the ** SECItem contains a big-endian number and counts from the first non-zero bit. */ extern unsigned SECKEY_BigIntegerBitLength(const SECItem *number); /* ** Return the strength of the public key in bytes */ extern unsigned SECKEY_PublicKeyStrength(const SECKEYPublicKey *pubk); /* ** Return the strength of the public key in bits */ extern unsigned SECKEY_PublicKeyStrengthInBits(const SECKEYPublicKey *pubk); /* ** Return the strength of the private key in bits */ extern unsigned SECKEY_PrivateKeyStrengthInBits(const SECKEYPrivateKey *privk); /* ** Return the length of the signature in bytes */ extern unsigned SECKEY_SignatureLen(const SECKEYPublicKey *pubk); /* ** Make a copy of the private key "privKey" */ extern SECKEYPrivateKey *SECKEY_CopyPrivateKey(const SECKEYPrivateKey *privKey); /* ** Make a copy of the public key "pubKey" */ extern SECKEYPublicKey *SECKEY_CopyPublicKey(const SECKEYPublicKey *pubKey); /* ** Convert a private key "privateKey" into a public key */ extern SECKEYPublicKey *SECKEY_ConvertToPublicKey(SECKEYPrivateKey *privateKey); /* * create a new RSA key pair. The private Key is returned... */ SECKEYPrivateKey *SECKEY_CreateRSAPrivateKey(int keySizeInBits, SECKEYPublicKey **pubk, void *cx); /* * create a new DH key pair. The private Key is returned... */ SECKEYPrivateKey *SECKEY_CreateDHPrivateKey(SECKEYDHParams *param, SECKEYPublicKey **pubk, void *cx); /* * create a new EC key pair. The private Key is returned... */ SECKEYPrivateKey *SECKEY_CreateECPrivateKey(SECKEYECParams *param, SECKEYPublicKey **pubk, void *cx); /* ** Create a subject-public-key-info based on a public key. */ extern CERTSubjectPublicKeyInfo * SECKEY_CreateSubjectPublicKeyInfo(const SECKEYPublicKey *k); /* ** Convert a base64 ascii encoded DER public key and challenge to spki, ** and verify the signature and challenge data are correct */ extern CERTSubjectPublicKeyInfo * SECKEY_ConvertAndDecodePublicKeyAndChallenge(char *pkacstr, char *challenge, void *cx); /* ** Encode a CERTSubjectPublicKeyInfo structure. into a ** DER encoded subject public key info. */ SECItem * SECKEY_EncodeDERSubjectPublicKeyInfo(const SECKEYPublicKey *pubk); /* ** Decode a DER encoded subject public key info into a ** CERTSubjectPublicKeyInfo structure. */ extern CERTSubjectPublicKeyInfo * SECKEY_DecodeDERSubjectPublicKeyInfo(const SECItem *spkider); /* ** Convert a base64 ascii encoded DER subject public key info to our ** internal format. */ extern CERTSubjectPublicKeyInfo * SECKEY_ConvertAndDecodeSubjectPublicKeyInfo(const char *spkistr); /* * extract the public key from a subject Public Key info structure. * (used by JSS). */ extern SECKEYPublicKey * SECKEY_ExtractPublicKey(const CERTSubjectPublicKeyInfo *); /* ** Destroy a private key object. ** "key" the object */ extern void SECKEY_DestroyPrivateKey(SECKEYPrivateKey *key); /* ** Destroy a public key object. ** "key" the object */ extern void SECKEY_DestroyPublicKey(SECKEYPublicKey *key); /* Destroy and zero out a private key info structure. for now this * function zero's out memory allocated in an arena for the key * since PORT_FreeArena does not currently do this. * * NOTE -- If a private key info is allocated in an arena, one should * not call this function with freeit = PR_FALSE. The function should * destroy the arena. */ extern void SECKEY_DestroyPrivateKeyInfo(SECKEYPrivateKeyInfo *pvk, PRBool freeit); /* Destroy and zero out an encrypted private key info. * * NOTE -- If a encrypted private key info is allocated in an arena, one should * not call this function with freeit = PR_FALSE. The function should * destroy the arena. */ extern void SECKEY_DestroyEncryptedPrivateKeyInfo(SECKEYEncryptedPrivateKeyInfo *epki, PRBool freeit); /* Copy private key info structure. * poolp is the arena into which the contents of from is to be copied. * NULL is a valid entry. * to is the destination private key info * from is the source private key info * if either from or to is NULL or an error occurs, SECFailure is * returned. otherwise, SECSuccess is returned. */ extern SECStatus SECKEY_CopyPrivateKeyInfo(PLArenaPool *poolp, SECKEYPrivateKeyInfo *to, const SECKEYPrivateKeyInfo *from); extern SECStatus SECKEY_CacheStaticFlags(SECKEYPrivateKey *key); /* Copy encrypted private key info structure. * poolp is the arena into which the contents of from is to be copied. * NULL is a valid entry. * to is the destination encrypted private key info * from is the source encrypted private key info * if either from or to is NULL or an error occurs, SECFailure is * returned. otherwise, SECSuccess is returned. */ extern SECStatus SECKEY_CopyEncryptedPrivateKeyInfo(PLArenaPool *poolp, SECKEYEncryptedPrivateKeyInfo *to, const SECKEYEncryptedPrivateKeyInfo *from); /* * Accessor functions for key type of public and private keys. */ KeyType SECKEY_GetPrivateKeyType(const SECKEYPrivateKey *privKey); KeyType SECKEY_GetPublicKeyType(const SECKEYPublicKey *pubKey); /* * Creates a PublicKey from its DER encoding. * Currently only supports RSA, DSA, and DH keys. */ SECKEYPublicKey * SECKEY_ImportDERPublicKey(const SECItem *derKey, CK_KEY_TYPE type); SECKEYPrivateKeyList * SECKEY_NewPrivateKeyList(void); void SECKEY_DestroyPrivateKeyList(SECKEYPrivateKeyList *keys); void SECKEY_RemovePrivateKeyListNode(SECKEYPrivateKeyListNode *node); SECStatus SECKEY_AddPrivateKeyToListTail(SECKEYPrivateKeyList *list, SECKEYPrivateKey *key); #define PRIVKEY_LIST_HEAD(l) ((SECKEYPrivateKeyListNode *)PR_LIST_HEAD(&l->list)) #define PRIVKEY_LIST_NEXT(n) ((SECKEYPrivateKeyListNode *)n->links.next) #define PRIVKEY_LIST_END(n, l) (((void *)n) == ((void *)&l->list)) SECKEYPublicKeyList * SECKEY_NewPublicKeyList(void); void SECKEY_DestroyPublicKeyList(SECKEYPublicKeyList *keys); void SECKEY_RemovePublicKeyListNode(SECKEYPublicKeyListNode *node); SECStatus SECKEY_AddPublicKeyToListTail(SECKEYPublicKeyList *list, SECKEYPublicKey *key); #define PUBKEY_LIST_HEAD(l) ((SECKEYPublicKeyListNode *)PR_LIST_HEAD(&l->list)) #define PUBKEY_LIST_NEXT(n) ((SECKEYPublicKeyListNode *)n->links.next) #define PUBKEY_LIST_END(n, l) (((void *)n) == ((void *)&l->list)) /* * Length in bits of the EC's field size. This is also the length of * the x and y coordinates of EC points, such as EC public keys and * base points. * * Return 0 on failure (unknown EC domain parameters). */ extern int SECKEY_ECParamsToKeySize(const SECItem *params); /* * Length in bits of the EC base point order, usually denoted n. This * is also the length of EC private keys and ECDSA signature components * r and s. * * Return 0 on failure (unknown EC domain parameters). */ extern int SECKEY_ECParamsToBasePointOrderLen(const SECItem *params); /* * Returns the object identifier of the curve, of the provided * elliptic curve parameters structures. * * Return 0 on failure (unknown EC domain parameters). */ SECOidTag SECKEY_GetECCOid(const SECKEYECParams *params); /* make sure the key length matches the policy for keyType */ SECStatus SECKEY_EnforceKeySize(KeyType keyType, unsigned keyLength, SECErrorCodes error); /* get the descriptive string for a given key type */ const char *SECKEY_GetKeyTypeString(KeyType keyType); /* Maps an ML-DSA OID tag to its corresponding PKCS#11's CKP_* parameter set */ CK_ML_DSA_PARAMETER_SET_TYPE SECKEY_GetMLDSAPkcs11ParamSetByOidTag(SECOidTag tag); /* Maps a PKCS#11's CKP_* parameter set to its corresponding ML-DSA OID tag */ SECOidTag SECKEY_GetMLDSAOidTagByPkcs11ParamSet(CK_ML_DSA_PARAMETER_SET_TYPE paramSet); typedef enum { SECKEYPubKeyType = 1, SECKEYPrivKeyType, SECKEYSignatureType, } SECKEYSizeType; unsigned int SECKEY_MLDSAOidParamsToLen(SECOidTag oid, SECKEYSizeType type); SEC_END_PROTOS #endif /* _KEYHI_H_ */