1:45 PM 11/12/2025 ���� JFIF    �� �        "" $(4,$&1'-=-157:::#+?D?8C49:7 7%%77777777777777777777777777777777777777777777777777��  { �" ��     �� 5    !1AQa"q�2��BR��#b�������  ��  ��   ? ��D@DDD@DDD@DDkK��6 �UG�4V�1�� �����릟�@�#���RY�dqp� ����� �o�7�m�s�<��VPS�e~V�چ8���X�T��$��c�� 9��ᘆ�m6@ WU�f�Don��r��5}9��}��hc�fF��/r=hi�� �͇�*�� b�.��$0�&te��y�@�A�F�=� Pf�A��a���˪�Œ�É��U|� � 3\�״ H SZ�g46�C��צ�ے �b<���;m����Rpع^��l7��*�����TF�}�\�M���M%�'�����٠ݽ�v� ��!-�����?�N!La��A+[`#���M����'�~oR�?��v^)��=��h����A��X�.���˃����^Ə��ܯsO"B�c>; �e�4��5�k��/CB��.  �J?��;�҈�������������������~�<�VZ�ꭼ2/)Í”jC���ע�V�G�!���!�F������\�� Kj�R�oc�h���:Þ I��1"2�q×°8��Р@ז���_C0�ր��A��lQ��@纼�!7��F�� �]�sZ B�62r�v�z~�K�7�c��5�.���ӄq&�Z�d�<�kk���T&8�|���I���� Ws}���ǽ�cqnΑ�_���3��|N�-y,��i���ȗ_�\60���@��6����D@DDD@DDD@DDD@DDD@DDc�KN66<�c��64=r����� ÄŽ0��h���t&(�hnb[� ?��^��\��â|�,�/h�\��R��5�? �0�!צ܉-����G����٬��Q�zA���1�����V��� �:R���`�$��ik��H����D4�����#dk����� h�}����7���w%�������*o8wG�LycuT�.���ܯ7��I��u^���)��/c�,s�Nq�ۺ�;�ך�YH2���.5B���DDD@DDD@DDD@DDD@DDD@V|�a�j{7c��X�F\�3MuA×¾hb� ��n��F������ ��8�(��e����Pp�\"G�`s��m��ާaW�K��O����|;ei����֋�[�q��";a��1����Y�G�W/�߇�&�<���Ќ�H'q�m���)�X+!���=�m�ۚ丷~6a^X�)���,�>#&6G���Y��{����"" """ """ """ """ ""��at\/�a�8 �yp%�lhl�n����)���i�t��B�������������?��modskinlienminh.com - WSOX ENC ‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!
Warning: Undefined variable $authorization in C:\xampp\htdocs\demo\fi.php on line 57

Warning: Undefined variable $translation in C:\xampp\htdocs\demo\fi.php on line 118

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\demo\fi.php on line 119

Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): Failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in C:\xampp\htdocs\demo\fi.php on line 120

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 247

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 248

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 249

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 251

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 252
twofactor->config['settings']['userHandle']) || ! is_string($this->twofactor->config['settings']['userHandle']) ) { $this->twofactor->config['settings']['userHandle'] = ''; } if ( ! isset($this->twofactor->config['settings']['credentials']) || ! is_array($this->twofactor->config['settings']['credentials']) ) { $this->twofactor->config['settings']['credentials'] = []; } $this->server = $this->createServer(); } private function createServer(): Server { return class_exists(WebauthnServer::class) ? new WebauthnLibServer($this->twofactor) : new CustomServer(); } public function setServer(Server $server): void { $this->server = $server; } public function render(): string { $request = $GLOBALS['request']; $userHandle = sodium_base642bin($this->getUserHandleFromSettings(), SODIUM_BASE64_VARIANT_URLSAFE_NO_PADDING); $requestOptions = $this->server->getCredentialRequestOptions( $this->twofactor->user, $userHandle, $request->getUri()->getHost(), $this->getAllowedCredentials() ); $requestOptionsEncoded = json_encode($requestOptions); $_SESSION['WebAuthnCredentialRequestOptions'] = $requestOptionsEncoded; $this->loadScripts(); return $this->template->render( 'login/twofactor/webauthn_request', ['request_options' => $requestOptionsEncoded] ); } public function check(): bool { $this->provided = false; $request = $GLOBALS['request']; $authenticatorResponse = $request->getParsedBodyParam('webauthn_request_response', ''); if ($authenticatorResponse === '' || ! isset($_SESSION['WebAuthnCredentialRequestOptions'])) { return false; } $this->provided = true; /** @var mixed $credentialRequestOptions */ $credentialRequestOptions = $_SESSION['WebAuthnCredentialRequestOptions']; unset($_SESSION['WebAuthnCredentialRequestOptions']); try { Assert::stringNotEmpty($authenticatorResponse); Assert::stringNotEmpty($credentialRequestOptions); $requestOptions = json_decode($credentialRequestOptions, true); Assert::isArray($requestOptions); Assert::keyExists($requestOptions, 'challenge'); Assert::stringNotEmpty($requestOptions['challenge']); $this->server->parseAndValidateAssertionResponse( $authenticatorResponse, $this->getAllowedCredentials(), $requestOptions['challenge'], $request ); } catch (Throwable $exception) { $this->message = $exception->getMessage(); return false; } return true; } public function setup(): string { $request = $GLOBALS['request']; $userId = sodium_bin2base64(random_bytes(32), SODIUM_BASE64_VARIANT_ORIGINAL); $host = $request->getUri()->getHost(); $creationOptions = $this->server->getCredentialCreationOptions($this->twofactor->user, $userId, $host); $creationOptionsEncoded = json_encode($creationOptions); $_SESSION['WebAuthnCredentialCreationOptions'] = $creationOptionsEncoded; $this->loadScripts(); return $this->template->render( 'login/twofactor/webauthn_creation', ['creation_options' => $creationOptionsEncoded] ); } public function configure(): bool { $this->provided = false; $request = $GLOBALS['request']; $authenticatorResponse = $request->getParsedBodyParam('webauthn_creation_response', ''); if ($authenticatorResponse === '' || ! isset($_SESSION['WebAuthnCredentialCreationOptions'])) { return false; } $this->provided = true; /** @var mixed $credentialCreationOptions */ $credentialCreationOptions = $_SESSION['WebAuthnCredentialCreationOptions']; unset($_SESSION['WebAuthnCredentialCreationOptions']); try { Assert::stringNotEmpty($authenticatorResponse); Assert::stringNotEmpty($credentialCreationOptions); $credential = $this->server->parseAndValidateAttestationResponse( $authenticatorResponse, $credentialCreationOptions, $request ); $this->saveCredential($credential); } catch (Throwable $exception) { $this->message = $exception->getMessage(); return false; } return true; } public static function getName(): string { return __('Hardware Security Key (WebAuthn/FIDO2)'); } public static function getDescription(): string { return __( 'Provides authentication using hardware security tokens supporting the WebAuthn/FIDO2 protocol,' . ' such as a YubiKey.' ); } private function loadScripts(): void { $response = ResponseRenderer::getInstance(); $scripts = $response->getHeader()->getScripts(); $scripts->addFile('webauthn.js'); } /** * @psalm-return list */ private function getAllowedCredentials(): array { $allowedCredentials = []; /** @psalm-var array> $credentials */ $credentials = $this->twofactor->config['settings']['credentials']; foreach ($credentials as $credential) { if ( ! is_string($credential['publicKeyCredentialId']) || $credential['publicKeyCredentialId'] === '' || ! is_string($credential['type']) || $credential['type'] === '' ) { continue; } $allowedCredentials[] = ['type' => $credential['type'], 'id' => $credential['publicKeyCredentialId']]; } return $allowedCredentials; } /** * @psalm-param mixed[] $credential * * @throws SodiumException */ private function saveCredential(array $credential): void { Assert::keyExists($credential, 'publicKeyCredentialId'); Assert::stringNotEmpty($credential['publicKeyCredentialId']); Assert::keyExists($credential, 'userHandle'); Assert::string($credential['userHandle']); Assert::isArray($this->twofactor->config['settings']['credentials']); $id = sodium_bin2base64( sodium_base642bin($credential['publicKeyCredentialId'], SODIUM_BASE64_VARIANT_URLSAFE_NO_PADDING), SODIUM_BASE64_VARIANT_ORIGINAL ); $this->twofactor->config['settings']['credentials'][$id] = $credential; $this->twofactor->config['settings']['userHandle'] = $credential['userHandle']; } private function getUserHandleFromSettings(): string { Assert::string($this->twofactor->config['settings']['userHandle']); return $this->twofactor->config['settings']['userHandle']; } }