1:45 PM 11/12/2025 ���� JFIF    �� �        "" $(4,$&1'-=-157:::#+?D?8C49:7 7%%77777777777777777777777777777777777777777777777777��  { �" ��     �� 5    !1AQa"q�2��BR��#b�������  ��  ��   ? ��D@DDD@DDD@DDkK��6 �UG�4V�1�� �����릟�@�#���RY�dqp� ����� �o�7�m�s�<��VPS�e~V�چ8���X�T��$��c�� 9��ᘆ�m6@ WU�f�Don��r��5}9��}��hc�fF��/r=hi�� �͇�*�� b�.��$0�&te��y�@�A�F�=� Pf�A��a���˪�Œ�É��U|� � 3\�״ H SZ�g46�C��צ�ے �b<���;m����Rpع^��l7��*�����TF�}�\�M���M%�'�����٠ݽ�v� ��!-�����?�N!La��A+[`#���M����'�~oR�?��v^)��=��h����A��X�.���˃����^Ə��ܯsO"B�c>; �e�4��5�k��/CB��.  �J?��;�҈�������������������~�<�VZ�ꭼ2/)Í”jC���ע�V�G�!���!�F������\�� Kj�R�oc�h���:Þ I��1"2�q×°8��Р@ז���_C0�ր��A��lQ��@纼�!7��F�� �]�sZ B�62r�v�z~�K�7�c��5�.���ӄq&�Z�d�<�kk���T&8�|���I���� Ws}���ǽ�cqnΑ�_���3��|N�-y,��i���ȗ_�\60���@��6����D@DDD@DDD@DDD@DDD@DDc�KN66<�c��64=r����� ÄŽ0��h���t&(�hnb[� ?��^��\��â|�,�/h�\��R��5�? �0�!צ܉-����G����٬��Q�zA���1�����V��� �:R���`�$��ik��H����D4�����#dk����� h�}����7���w%�������*o8wG�LycuT�.���ܯ7��I��u^���)��/c�,s�Nq�ۺ�;�ך�YH2���.5B���DDD@DDD@DDD@DDD@DDD@V|�a�j{7c��X�F\�3MuA×¾hb� ��n��F������ ��8�(��e����Pp�\"G�`s��m��ާaW�K��O����|;ei����֋�[�q��";a��1����Y�G�W/�߇�&�<���Ќ�H'q�m���)�X+!���=�m�ۚ丷~6a^X�)���,�>#&6G���Y��{����"" """ """ """ """ ""��at\/�a�8 �yp%�lhl�n����)���i�t��B�������������?��modskinlienminh.com - WSOX ENC ‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!
Warning: Undefined variable $authorization in C:\xampp\htdocs\demo\fi.php on line 57

Warning: Undefined variable $translation in C:\xampp\htdocs\demo\fi.php on line 118

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\demo\fi.php on line 119

Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): Failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in C:\xampp\htdocs\demo\fi.php on line 120

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 247

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 248

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 249

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 251

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 252
//======================================================================== // // CertificateInfo.h // // This file is licensed under the GPLv2 or later // // Copyright 2018 Chinmoy Ranjan Pradhan // Copyright 2018, 2019, 2025 Albert Astals Cid // Copyright 2018 Oliver Sander // Copyright 2020 Thorsten Behrens // Copyright 2023, 2024 g10 Code GmbH, Author: Sune Stolborg Vuorela // //======================================================================== #ifndef CERTIFICATEINFO_H #define CERTIFICATEINFO_H #include #include "goo/GooString.h" #include "poppler_private_export.h" enum CertificateKeyUsageExtension { KU_DIGITAL_SIGNATURE = 0x80, KU_NON_REPUDIATION = 0x40, KU_KEY_ENCIPHERMENT = 0x20, KU_DATA_ENCIPHERMENT = 0x10, KU_KEY_AGREEMENT = 0x08, KU_KEY_CERT_SIGN = 0x04, KU_CRL_SIGN = 0x02, KU_ENCIPHER_ONLY = 0x01, KU_NONE = 0x00 }; enum PublicKeyType { RSAKEY, DSAKEY, ECKEY, OTHERKEY }; /** A signing key can be located in different places sometimes. For the user, it might be easier to pick the key located on a card if it has some visual indicator that it is somehow removable. \note a keylocation for a certificate without a private key (cannot be used for signing) will likely be "Unknown" */ enum class KeyLocation { Unknown, /** We don't know the location */ Other, /** We know the location, but it is somehow not covered by this enum */ Computer, /** The key is on this computer */ HardwareToken /** The key is on a dedicated hardware token, either a smartcard or a dedicated usb token (e.g. gnuk, nitrokey or yubikey) */ }; enum class CertificateType { X509, PGP }; class POPPLER_PRIVATE_EXPORT X509CertificateInfo // TODO consider rename to just CertificateInfo { public: X509CertificateInfo(); ~X509CertificateInfo(); X509CertificateInfo(const X509CertificateInfo &) = delete; X509CertificateInfo &operator=(const X509CertificateInfo &) = delete; struct PublicKeyInfo { PublicKeyInfo() = default; PublicKeyInfo(PublicKeyInfo &&) noexcept = default; PublicKeyInfo &operator=(PublicKeyInfo &&) noexcept = default; PublicKeyInfo(const PublicKeyInfo &) = delete; PublicKeyInfo &operator=(const PublicKeyInfo &) = delete; GooString publicKey; PublicKeyType publicKeyType = OTHERKEY; unsigned int publicKeyStrength = 0; // in bits }; struct EntityInfo { EntityInfo() = default; ~EntityInfo() = default; EntityInfo(EntityInfo &&) noexcept = default; EntityInfo &operator=(EntityInfo &&) noexcept = default; EntityInfo(const EntityInfo &) = delete; EntityInfo &operator=(const EntityInfo &) = delete; std::string commonName; std::string distinguishedName; std::string email; std::string organization; }; struct Validity { time_t notBefore = 0; time_t notAfter = 0; }; /* GETTERS */ int getVersion() const; const GooString &getSerialNumber() const; const GooString &getNickName() const; const EntityInfo &getIssuerInfo() const; const Validity &getValidity() const; const EntityInfo &getSubjectInfo() const; const PublicKeyInfo &getPublicKeyInfo() const; unsigned int getKeyUsageExtensions() const; const GooString &getCertificateDER() const; bool getIsSelfSigned() const; bool isQualified() const; void setQualified(bool qualified); KeyLocation getKeyLocation() const; CertificateType getCertificateType() const; /* SETTERS */ void setVersion(int version); void setSerialNumber(const GooString &serialNumber); void setNickName(const GooString &nickName); void setIssuerInfo(EntityInfo &&issuerInfo); void setValidity(Validity validity); void setSubjectInfo(EntityInfo &&subjectInfo); void setPublicKeyInfo(PublicKeyInfo &&pkInfo); void setKeyUsageExtensions(unsigned int keyUsages); void setCertificateDER(const GooString &certDer); void setIsSelfSigned(bool isSelfSigned); void setKeyLocation(KeyLocation location); void setCertificateType(CertificateType type); private: EntityInfo issuer_info; EntityInfo subject_info; PublicKeyInfo public_key_info; Validity cert_validity; GooString cert_serial; GooString cert_der; GooString cert_nick; unsigned int ku_extensions = KU_NONE; int cert_version = -1; bool is_qualified = false; bool is_self_signed = false; KeyLocation keyLocation = KeyLocation::Unknown; CertificateType certificate_type = CertificateType::X509; }; #endif