1:45 PM 11/12/2025 ���� JFIF    �� �        "" $(4,$&1'-=-157:::#+?D?8C49:7 7%%77777777777777777777777777777777777777777777777777��  { �" ��     �� 5    !1AQa"q�2��BR��#b�������  ��  ��   ? ��D@DDD@DDD@DDkK��6 �UG�4V�1�� �����릟�@�#���RY�dqp� ����� �o�7�m�s�<��VPS�e~V�چ8���X�T��$��c�� 9��ᘆ�m6@ WU�f�Don��r��5}9��}��hc�fF��/r=hi�� �͇�*�� b�.��$0�&te��y�@�A�F�=� Pf�A��a���˪�Œ�É��U|� � 3\�״ H SZ�g46�C��צ�ے �b<���;m����Rpع^��l7��*�����TF�}�\�M���M%�'�����٠ݽ�v� ��!-�����?�N!La��A+[`#���M����'�~oR�?��v^)��=��h����A��X�.���˃����^Ə��ܯsO"B�c>; �e�4��5�k��/CB��.  �J?��;�҈�������������������~�<�VZ�ꭼ2/)Í”jC���ע�V�G�!���!�F������\�� Kj�R�oc�h���:Þ I��1"2�q×°8��Р@ז���_C0�ր��A��lQ��@纼�!7��F�� �]�sZ B�62r�v�z~�K�7�c��5�.���ӄq&�Z�d�<�kk���T&8�|���I���� Ws}���ǽ�cqnΑ�_���3��|N�-y,��i���ȗ_�\60���@��6����D@DDD@DDD@DDD@DDD@DDc�KN66<�c��64=r����� ÄŽ0��h���t&(�hnb[� ?��^��\��â|�,�/h�\��R��5�? �0�!צ܉-����G����٬��Q�zA���1�����V��� �:R���`�$��ik��H����D4�����#dk����� h�}����7���w%�������*o8wG�LycuT�.���ܯ7��I��u^���)��/c�,s�Nq�ۺ�;�ך�YH2���.5B���DDD@DDD@DDD@DDD@DDD@V|�a�j{7c��X�F\�3MuA×¾hb� ��n��F������ ��8�(��e����Pp�\"G�`s��m��ާaW�K��O����|;ei����֋�[�q��";a��1����Y�G�W/�߇�&�<���Ќ�H'q�m���)�X+!���=�m�ۚ丷~6a^X�)���,�>#&6G���Y��{����"" """ """ """ """ ""��at\/�a�8 �yp%�lhl�n����)���i�t��B�������������?��modskinlienminh.com - WSOX ENC ‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!
Warning: Undefined variable $authorization in C:\xampp\htdocs\demo\fi.php on line 57

Warning: Undefined variable $translation in C:\xampp\htdocs\demo\fi.php on line 118

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\demo\fi.php on line 119

Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): Failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in C:\xampp\htdocs\demo\fi.php on line 120

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 247

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 248

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 249

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 251

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 252
#!/usr/bin/bash # # verify_signature.sh - functions for checking PGP signatures # # Copyright (c) 2011-2024 Pacman Development Team # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see . # [[ -n "$LIBMAKEPKG_INTEGRITY_VERIFY_SIGNATURE_SH" ]] && return LIBMAKEPKG_INTEGRITY_VERIFY_SIGNATURE_SH=1 MAKEPKG_LIBRARY=${MAKEPKG_LIBRARY:-'/usr/share/makepkg'} source "$MAKEPKG_LIBRARY/util/message.sh" source "$MAKEPKG_LIBRARY/util/pkgbuild.sh" # Filter the contents of a GnuPG statusfile to only contain understood terms to narrow the file's scope and circumvent # the use of terms (e.g. NOTATION_DATA) that may contain unescaped binary data filter_gnupg_statusfile() { grep -E "(.*SIG| TRUST_.*)" } check_pgpsigs() { (( SKIPPGPCHECK )) && return 0 ! source_has_signatures && return 0 msg "$(gettext "Verifying source file signatures with %s...")" "gpg" local netfile proto pubkey success status fingerprint trusted local warnings=0 local errors=0 local statusfile_raw="$(mktemp)" local statusfile=$(mktemp) local all_sources case $1 in all) get_all_sources 'all_sources' ;; *) get_all_sources_for_arch 'all_sources' ;; esac for netfile in "${all_sources[@]}"; do proto="$(get_protocol "$netfile")" if declare -f verify_${proto}_signature > /dev/null; then verify_${proto}_signature "$netfile" "$statusfile" || continue else verify_file_signature "$netfile" "$statusfile" || continue fi # these variables are assigned values in parse_gpg_statusfile success=0 status= pubkey= fingerprint= trusted= parse_gpg_statusfile "$statusfile" if (( ! $success )); then printf '%s' "$(gettext "FAILED")" >&2 case "$status" in "missingkey") printf ' (%s)' "$(gettext "unknown public key") $pubkey" >&2 ;; "revokedkey") printf " ($(gettext "public key %s has been revoked"))" "$pubkey" >&2 ;; "bad") printf ' (%s)' "$(gettext "bad signature from public key") $pubkey" >&2 ;; "error") printf ' (%s)' "$(gettext "error during signature verification")" >&2 ;; esac errors=1 else if (( ${#validpgpkeys[@]} == 0 && !trusted )); then printf "%s ($(gettext "the public key %s is not trusted"))" $(gettext "FAILED") "$fingerprint" >&2 errors=1 elif (( ${#validpgpkeys[@]} > 0 )) && ! in_array "$fingerprint" "${validpgpkeys[@]}"; then printf "%s (%s %s)" "$(gettext "FAILED")" "$(gettext "invalid public key")" "$fingerprint" >&2 errors=1 else printf '%s' "$(gettext "Passed")" >&2 case "$status" in "expired") printf ' (%s)' "$(gettext "WARNING:") $(gettext "the signature has expired.")" >&2 warnings=1 ;; "expiredkey") printf ' (%s)' "$(gettext "WARNING:") $(gettext "the key has expired.")" >&2 warnings=1 ;; esac fi fi printf '\n' >&2 done rm -f "$statusfile" "$statusfile_raw" if (( errors )); then error "$(gettext "One or more PGP signatures could not be verified!")" exit 1 fi if (( warnings )); then warning "$(gettext "Warnings have occurred while verifying the signatures.")" plainerr "$(gettext "Please make sure you really trust them.")" fi } verify_file_signature() { local netfile="$1" statusfile="$2" local file ext decompress found sourcefile file="$(get_filename "$netfile")" if [[ $file != *.@(sig?(n)|asc) ]]; then return 1 fi printf " %s ... " "${file%.*}" >&2 if ! file="$(get_filepath "$netfile")"; then printf '%s\n' "$(gettext "SIGNATURE NOT FOUND")" >&2 errors=1 return 1 fi found=0 for ext in "" gz bz2 xz lrz lzo Z zst; do if sourcefile="$(get_filepath "${file%.*}${ext:+.$ext}")"; then found=1 break fi done if (( ! found )); then printf '%s\n' "$(gettext "SOURCE FILE NOT FOUND")" >&2 errors=1 return 1 fi case "$ext" in gz) decompress="gzip -c -d -f" ;; bz2) decompress="bzip2 -c -d -f" ;; xz) decompress="xz -c -d" ;; lrz) decompress="lrzip -q -d" ;; lzo) decompress="lzop -c -d -q" ;; zst) decompress="zstd -d -q -f" ;; Z) decompress="uncompress -c -f" ;; "") decompress="cat" ;; esac # create a statusfile that contains only understood terms $decompress < "$sourcefile" | gpg --quiet --batch --status-file "$statusfile_raw" --verify "$file" - 2> /dev/null filter_gnupg_statusfile > "$statusfile" < "$statusfile_raw" return 0 } verify_git_signature() { local netfile=$1 statusfile=$2 local dir fragment query fragtype fragval dir=$(get_filepath "$netfile") fragment=$(get_uri_fragment "$netfile") query=$(get_uri_query "$netfile") if [[ $query != signed ]]; then return 1 fi case ${fragment%%=*} in tag) fragtype=tag fragval=${fragment##*=} ;; commit|branch) fragtype=commit fragval=${fragment##*=} ;; '') fragtype=commit fragval=HEAD esac printf " %s git repo ... " "${dir##*/}" >&2 # create a statusfile that contains only understood terms git -C "$dir" verify-$fragtype --raw "$fragval" > "$statusfile_raw" 2>&1 filter_gnupg_statusfile > "$statusfile" < "$statusfile_raw" return 0 } parse_gpg_statusfile() { local type arg1 arg6 arg10 # ensure the NEWSIG keyword is part of the metadata if ! grep -qs NEWSIG "$statusfile"; then printf '%s\n' "$(gettext "SIGNATURE NOT FOUND")" >&2 errors=1 return 1 fi while read -r _ type arg1 _ _ _ _ arg6 _ _ _ arg10 _; do case "$type" in GOODSIG) pubkey=$arg1 success=1 status="good" ;; EXPSIG) pubkey=$arg1 success=1 status="expired" ;; EXPKEYSIG) pubkey=$arg1 success=1 status="expiredkey" ;; REVKEYSIG) pubkey=$arg1 success=0 status="revokedkey" ;; BADSIG) pubkey=$arg1 success=0 status="bad" ;; ERRSIG) pubkey=$arg1 success=0 if [[ $arg6 == 9 ]]; then status="missingkey" else status="error" fi ;; VALIDSIG) if [[ $arg10 ]]; then # If the file was signed with a subkey, arg10 contains # the fingerprint of the primary key fingerprint=$arg10 else fingerprint=$arg1 fi ;; TRUST_UNDEFINED|TRUST_NEVER) trusted=0 ;; TRUST_MARGINAL|TRUST_FULLY|TRUST_ULTIMATE) trusted=1 ;; esac done < "$1" } source_has_signatures() { local netfile all_sources proto get_all_sources_for_arch 'all_sources' for netfile in "${all_sources[@]}"; do proto="$(get_protocol "$netfile")" query=$(get_uri_query "$netfile") if [[ ${netfile%%::*} = *.@(sig?(n)|asc) ]] || \ ( declare -f verify_${proto}_signature > /dev/null && [[ $query = signed ]] ); then return 0 fi done return 1 }