%PDF- %PDF-
Mini Shell

Mini Shell

Direktori : /usr/local/share/emacs/27.2/lisp/gnus/
Upload File :
Create Path :
Current File : //usr/local/share/emacs/27.2/lisp/gnus/mml-sec.elc

;ELC
;;; Compiled
;;; in Emacs version 27.2
;;; with all optimizations.

;;; This file uses dynamic docstrings, first added in Emacs 19.29.

;;; This file does not contain utf-8 non-ASCII characters,
;;; and so can be loaded in Emacs versions earlier than 23.

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;


(byte-code "\300\301!\210\300\302!\210\300\303!\210\300\304!\210\300\305!\210\300\306!\210\307\310\311\"\210\307\312\313\"\210\307\314\313\"\210\307\315\316\"\210\307\317\316\"\210\307\320\321\"\210\307\322\321\"\210\307\323\321\"\210\307\324\325\"\210\307\326\327\"\210\307\330\327\"\210\307\331\327\"\210\307\332\327\"\210\307\333\327\"\210\307\334\327\"\210\307\335\336\"\210\307\323\321\"\210\307\337\321\"\207" [require cl-lib gnus-util epg epa password-cache mm-encode autoload mail-strip-quoted-names "mail-utils" mml2015-sign "mml2015" mml2015-encrypt mml1991-sign "mml1991" mml1991-encrypt message-fetch-field "message" message-goto-body message-options-get mml-insert-tag "mml" mml-smime-sign "mml-smime" mml-smime-encrypt mml-smime-sign-query mml-smime-encrypt-query mml-smime-verify mml-smime-verify-test epa--select-keys "epa" message-options-set] 3)
#@33 Alist of MIME signer functions.
(defvar mml-sign-alist '(("smime" mml-smime-sign-buffer mml-smime-sign-query) ("pgp" mml-pgp-sign-buffer list) ("pgpauto" mml-pgpauto-sign-buffer list) ("pgpmime" mml-pgpmime-sign-buffer list)) (#$ . 1272))
#@73 Default sign method.
The string must have an entry in `mml-sign-alist'.
(custom-declare-variable 'mml-default-sign-method "pgpmime" '(#$ . 1517) :version "22.1" :type '(choice (const "smime") (const "pgp") (const "pgpauto") (const "pgpmime") string) :group 'message)
#@37 Alist of MIME encryption functions.
(defvar mml-encrypt-alist '(("smime" mml-smime-encrypt-buffer mml-smime-encrypt-query) ("pgp" mml-pgp-encrypt-buffer list) ("pgpauto" mml-pgpauto-sign-buffer list) ("pgpmime" mml-pgpmime-encrypt-buffer list)) (#$ . 1790))
(byte-code "\300\301\302\303\304\305\306\307\310\311&	\210\300\312\313\314\304\305\310\311\306\315&	\210\300\316\317\320\310\311\306\321&\210\300\322\323\324\310\311\306\321&\210\300\325\326\327\310\311\306\330&\210\300\331\317\332\304\333\310\311\306\334&	\207" [custom-declare-variable mml-default-encrypt-method "pgpmime" "Default encryption method.\nThe string must have an entry in `mml-encrypt-alist'." :version "22.1" :type (choice (const "smime") (const "pgp") (const "pgpauto") (const "pgpmime") string) :group message mml-signencrypt-style-alist '(("smime" separate) ("pgp" combined) ("pgpauto" combined) ("pgpmime" combined)) "Alist specifying if `signencrypt' results in two separate operations or not.\nThe first entry indicates the MML security type, valid entries include\nthe strings \"smime\", \"pgp\", and \"pgpmime\".  The second entry is\na symbol `separate' or `combined' where `separate' means that MML signs\nand encrypt messages in a two step process, and `combined' means that MML\nsigns and encrypt the message in one step.\n\nNote that the output generated by using a `combined' mode is NOT\nunderstood by all PGP implementations, in particular PGP version\n2 does not support it!  See Info node `(message) Security' for\ndetails." (repeat (list (choice (const :tag "S/MIME" "smime") (const :tag "PGP" "pgp") (const :tag "PGP/MIME" "pgpmime") (string :tag "User defined")) (choice (const :tag "Separate" separate) (const :tag "Combined" combined)))) mml-secure-verbose nil "If non-nil, ask the user about the current operation more verbosely." boolean mml-secure-cache-passphrase password-cache "If t, cache OpenPGP or S/MIME passphrases inside Emacs.\nPassphrase caching in Emacs is NOT recommended.  Use gpg-agent instead.\nSee Info node `(message) Security'." mml-secure-passphrase-cache-expiry password-cache-expiry "How many seconds the passphrase is cached.\nWhether the passphrase is cached at all is controlled by\n`mml-secure-cache-passphrase'." integer mml-secure-safe-bcc-list "List of e-mail addresses that are safe to use in Bcc headers.\nEasyPG encrypts e-mails to Bcc addresses, and the encrypted e-mail\nby default identifies the used encryption keys, giving away the\nBcc'ed identities.  Clearly, this contradicts the original goal of\n*blind* copies.\nFor an academic paper explaining the problem, see URL\n`http://crypto.stanford.edu/portia/papers/bb-bcc.pdf'.\nUse this variable to specify e-mail addresses whose owners do not\nmind if they are identifiable as recipients.  This may be useful if\nyou use Bcc headers to encrypt e-mails to yourself." "25.1" (repeat string)] 10)
#@463 Function for setting/getting the signencrypt-style used.  Takes two
arguments, the method (e.g. "pgp") and optionally the mode
(e.g. combined).  If the mode is omitted, the current value is returned.

For example, if you prefer to use combined sign & encrypt with
smime, putting the following in your Gnus startup file will
enable that behavior:

(mml-set-signencrypt-style "smime" combined)

You can also customize or set `mml-signencrypt-style-alist' instead.
(defalias 'mml-signencrypt-style #[(method &optional style) "\305	\"\211\203%\306=\204\307=\203\n\211A\240)\202(\nA@\202(\310\311!)\207" [method mml-signencrypt-style-alist style-item style #1=#:v assoc separate combined message "Warning, attempt to set invalid signencrypt style"] 4 (#$ . 4683)])
(defalias 'mml-smime-sign-buffer #[(cont) "\301!\206	\302\303!\207" [cont mml-smime-sign error "Signing failed... inspect message logs for errors"] 2])
(defalias 'mml-smime-encrypt-buffer #[(cont &optional sign) "\203\f\302\303!\210\304\305!\210\306	!\206\307\310!\207" [sign cont message "Combined sign and encrypt S/MIME not support yet" sit-for 1 mml-smime-encrypt error "Encryption failed... inspect message logs for errors"] 2])
(defalias 'mml-pgp-sign-buffer #[(cont) "\301!\206	\302\303!\207" [cont mml1991-sign error "Signing failed... inspect message logs for errors"] 2])
(defalias 'mml-pgp-encrypt-buffer #[(cont &optional sign) "\302	\"\206\n\303\304!\207" [cont sign mml1991-encrypt error "Encryption failed... inspect message logs for errors"] 3])
(defalias 'mml-pgpmime-sign-buffer #[(cont) "\301!\206	\302\303!\207" [cont mml2015-sign error "Signing failed... inspect message logs for errors"] 2])
(defalias 'mml-pgpmime-encrypt-buffer #[(cont &optional sign) "\302	\"\206\n\303\304!\207" [cont sign mml2015-encrypt error "Encryption failed... inspect message logs for errors"] 3])
(defalias 'mml-pgpauto-sign-buffer #[(cont) "\301 \210\302\303\304\305#\203\306!\202\307!\206\310\311!\207" [cont message-goto-body re-search-backward "Content-Type: *multipart/.*" nil t mml2015-sign mml1991-sign error "Encryption failed... inspect message logs for errors"] 4])
(defalias 'mml-pgpauto-encrypt-buffer #[(cont &optional sign) "\302 \210\303\304\305\306#\203\307	\"\202\310	\"\206\311\312!\207" [cont sign message-goto-body re-search-backward "Content-Type: *multipart/.*" nil t mml2015-encrypt mml1991-encrypt error "Encryption failed... inspect message logs for errors"] 4])
(defalias 'mml-secure-part #[(method &optional sign) "\212\306\307	\203\f\n\202
\"8 \310\311\312\313#\203V\314\225b\210	\203%\315\202&\316\261\210\f\205\215\f\211A\242\f\211A\242
\203R\317\320
\"\203J\321
!\322\323
#c\210*\202*\310\324\325!\326Q\312\313#\204r\327\324\325!\326Q\312\313#\203\212\314\225b\210\330\331\332	\203\201\301\202\202\333\fBB#\202\215\334\335!*\207" [method sign mml-sign-alist mml-encrypt-alist tags value 2 assoc re-search-backward "<#\\(multipart\\|part\\|external\\|mml\\)" nil t 0 " sign=" " encrypt=" string-match "[\"'\\~/*;() 	\n]" prin1-to-string format " %s=%s" "^" regexp-quote "\n" re-search-forward apply mml-insert-tag part encrypt error "The message is corrupted. No mail header separator" key mail-header-separator] 6])
#@46 Current security method.  Internal variable.
(defvar mml-secure-method (byte-code "	\232\203	\207\302\207" [mml-default-encrypt-method mml-default-sign-method "pgpmime"] 2) (#$ . 7972))
#@118 Add MML tags to sign this MML part.
Use METHOD if given.  Else use `mml-secure-method' or
`mml-default-sign-method'.
(defalias 'mml-secure-sign #[(&optional method) "\303\206\n	\206\n\n\304\"\207" [method mml-secure-method mml-default-sign-method mml-secure-part sign] 3 (#$ . 8168) nil])
#@121 Add MML tags to encrypt this MML part.
Use METHOD if given.  Else use `mml-secure-method' or
`mml-default-sign-method'.
(defalias 'mml-secure-encrypt #[(&optional method) "\303\206\n	\206\n\n!\207" [method mml-secure-method mml-default-sign-method mml-secure-part] 2 (#$ . 8467) nil])
#@41 Add MML tags to PGP sign this MML part.
(defalias 'mml-secure-sign-pgp #[nil "\300\301\302\"\207" [mml-secure-part "pgp" sign] 3 (#$ . 8761) nil])
#@46 Add MML tags to PGP-auto sign this MML part.
(defalias 'mml-secure-sign-pgpauto #[nil "\300\301\302\"\207" [mml-secure-part "pgpauto" sign] 3 (#$ . 8914) nil])
#@46 Add MML tags to PGP/MIME sign this MML part.
(defalias 'mml-secure-sign-pgpmime #[nil "\300\301\302\"\207" [mml-secure-part "pgpmime" sign] 3 (#$ . 9080) nil])
#@44 Add MML tags to S/MIME sign this MML part.
(defalias 'mml-secure-sign-smime #[nil "\300\301\302\"\207" [mml-secure-part "smime" sign] 3 (#$ . 9246) nil])
#@44 Add MML tags to PGP encrypt this MML part.
(defalias 'mml-secure-encrypt-pgp #[nil "\300\301!\207" [mml-secure-part "pgp"] 2 (#$ . 9406) nil])
#@49 Add MML tags to PGP/MIME encrypt this MML part.
(defalias 'mml-secure-encrypt-pgpmime #[nil "\300\301!\207" [mml-secure-part "pgpmime"] 2 (#$ . 9555) nil])
#@47 Add MML tags to S/MIME encrypt this MML part.
(defalias 'mml-secure-encrypt-smime #[nil "\300\301!\207" [mml-secure-part "smime"] 2 (#$ . 9717) nil])
#@46 Check whether secure encrypt tag is present.
(defalias 'mml-secure-is-encrypted-p #[nil "\212eb\210\301\302\303!\304Q\305\306#)\207" [mail-header-separator re-search-forward "^" regexp-quote "\n<#secure[^>]+encrypt" nil t] 4 (#$ . 9873)])
#@422 Check whether usage of Bcc is safe (or absent).
Bcc usage is safe in two cases: first, if the current message does
not contain an MML secure encrypt tag;
second, if the Bcc addresses are a subset of `mml-secure-safe-bcc-list'.
In all other cases, ask the user whether Bcc usage is safe.
Raise error if user answers no.
Note that this function does not produce a meaningful return value:
either an error is raised or not.
(defalias 'mml-secure-bcc-is-safe #[nil "\303 \205+\304\305\306!!\211\205*\307\310\311\312\"\"\313	\n\"?\205)\314\315!?\205)\316\317!))\207" [bcc bcc-list mml-secure-safe-bcc-list mml-secure-is-encrypted-p mail-strip-quoted-names message-fetch-field "bcc" mapcar cadr mail-extract-address-components t gnus-subsetp yes-or-no-p "Message for encryption contains Bcc header.  This may give away all Bcc'ed identities to all recipients.  Are you sure that this is safe?  (Customize `mml-secure-safe-bcc-list' to avoid this warning.) " error "Aborted"] 6 (#$ . 10120)])
(defalias 'mml-secure-message #[(method &optional modesym) "\306!\307\310=\204\311=\205\312\313	\n\"8 \314=\204#\311=\205*\312\313	\"8 \"\315\316 \210\212eb\210\317\320\321!\322Q\315\323#\203`\324\225\211b\210\325\326!\204d\327\330\331\301	\332
&\210\202d\333\334!\210)\335\f`\"\205n\336y+\207" [modesym method mml-sign-alist mml-encrypt-alist insert-loc tags prin1-to-string append sign signencrypt 2 assoc encrypt nil mml-unsecure-message re-search-forward "^" regexp-quote "\n" t 0 looking-at "<#secure" apply mml-insert-tag secure mode error "The message is corrupted. No mail header separator" eql 1 mail-header-separator] 8])
#@48 Remove security related MML tags from message.
(defalias 'mml-unsecure-message #[nil "\212db\210\300\301\302\303#\205\304\224\304\225|)\207" [re-search-backward "^<#secure.*>\n" nil t 0] 4 (#$ . 11777) nil])
#@123 Add MML tags to sign the entire message.
Use METHOD if given.  Else use `mml-secure-method' or
`mml-default-sign-method'.
(defalias 'mml-secure-message-sign #[(&optional method) "\303\206\n	\206\n\n\304\"\207" [method mml-secure-method mml-default-sign-method mml-secure-message sign] 3 (#$ . 11994) nil])
#@134 Add MML tag to sign and encrypt the entire message.
Use METHOD if given.  Else use `mml-secure-method' or
`mml-default-sign-method'.
(defalias 'mml-secure-message-sign-encrypt #[(&optional method) "\303\206\n	\206\n\n\304\"\207" [method mml-secure-method mml-default-sign-method mml-secure-message signencrypt] 3 (#$ . 12310) nil])
#@125 Add MML tag to encrypt the entire message.
Use METHOD if given.  Else use `mml-secure-method' or
`mml-default-sign-method'.
(defalias 'mml-secure-message-encrypt #[(&optional method) "\303\206\n	\206\n\n\304\"\207" [method mml-secure-method mml-default-sign-method mml-secure-message encrypt] 3 (#$ . 12652) nil])
#@49 Add MML tag to encrypt/sign the entire message.
(defalias 'mml-secure-message-sign-smime #[nil "\300\301\302\"\207" [mml-secure-message "smime" sign] 3 (#$ . 12975) nil])
#@49 Add MML tag to encrypt/sign the entire message.
(defalias 'mml-secure-message-sign-pgp #[nil "\300\301\302\"\207" [mml-secure-message "pgp" sign] 3 (#$ . 13152) nil])
#@49 Add MML tag to encrypt/sign the entire message.
(defalias 'mml-secure-message-sign-pgpmime #[nil "\300\301\302\"\207" [mml-secure-message "pgpmime" sign] 3 (#$ . 13325) nil])
#@49 Add MML tag to encrypt/sign the entire message.
(defalias 'mml-secure-message-sign-pgpauto #[nil "\300\301\302\"\207" [mml-secure-message "pgpauto" sign] 3 (#$ . 13506) nil])
#@115 Add MML tag to encrypt and sign the entire message.
If called with a prefix argument, only encrypt (do NOT sign).
(defalias 'mml-secure-message-encrypt-smime #[(&optional dontsign) "\301\302\203\n\303\202\304\"\207" [dontsign mml-secure-message "smime" encrypt signencrypt] 3 (#$ . 13688) "P"])
#@115 Add MML tag to encrypt and sign the entire message.
If called with a prefix argument, only encrypt (do NOT sign).
(defalias 'mml-secure-message-encrypt-pgp #[(&optional dontsign) "\301\302\203\n\303\202\304\"\207" [dontsign mml-secure-message "pgp" encrypt signencrypt] 3 (#$ . 13994) "P"])
#@115 Add MML tag to encrypt and sign the entire message.
If called with a prefix argument, only encrypt (do NOT sign).
(defalias 'mml-secure-message-encrypt-pgpmime #[(&optional dontsign) "\301\302\203\n\303\202\304\"\207" [dontsign mml-secure-message "pgpmime" encrypt signencrypt] 3 (#$ . 14296) "P"])
#@115 Add MML tag to encrypt and sign the entire message.
If called with a prefix argument, only encrypt (do NOT sign).
(defalias 'mml-secure-message-encrypt-pgpauto #[(&optional dontsign) "\301\302\203\n\303\202\304\"\207" [dontsign mml-secure-message "pgpauto" encrypt signencrypt] 3 (#$ . 14606) "P"])
(byte-code "\302\303\304\305#\210\306\305\211\203,	@\303N\203%\304N\204%\307\304\303N#\210	A\211\204*\310\303\304\311#\210\302\312\304\305#\210\306\305\211\203_	@\312N\203X\304N\204X\307\304\312N#\210	A\211\204A*\310\312\304\311#\210\313\304\305\314\315\316\317\320&\210\302\321\322\305#\210\306\305\211\203\235	@\321N\203\226\322N\204\226\307\322\321N#\210	A\211\204*\310\321\322\311#\210\313\322\305\323\315\316\317\324&\210\302\325\326\305#\210\306\305\211\203\333	@\325N\203\324\326N\204\324\307\326\325N#\210	A\211\204\275*\310\325\326\311#\210\302\327\326\305#\210\306\305\211\203	@\327N\203\326N\204\307\326\327N#\210	A\211\204\360*\310\327\326\311#\210\313\326\305\330\315\316\317\331&\210\302\332\333\305#\210\306\305\211\203L	@\332N\203E\333N\204E\307\333\332N#\210	A\211\204.*\310\332\333\311#\210\313\333\305\334\315\316\317\335&\210\302\336\337\305#\210\306\305\211\203\212	@\336N\203\203\337N\204\203\307\337\336N#\210	A\211\204l*\310\336\337\311#\210\313\337\305\340\315\316\317\341&\210\302\342\343\305#\210\306\305\211\203\310	@\342N\203\301\343N\204\301\307\343\342N#\210	A\211\204\252*\310\342\343\311#\210\313\343\305\344\315\316\317\341&\210\302\345\346\305#\210\306\305\211\203	@\345N\203\377\346N\204\377\307\346\345N#\210	A\211\204\350*\310\345\346\311#\210\313\346\347\350\315\316\317\341&\210\313\351\305\352\353\311\315\316\317\341&	\210\313\354\355\356\353\311\315\316\317\357&	\207" [prop --dolist-tail-- defvaralias mml1991-signers mml-secure-openpgp-signers nil (saved-value saved-variable-comment) put make-obsolete-variable "25.1" mml2015-signers custom-declare-variable "A list of your own key ID(s) which will be used to sign OpenPGP messages.\nIf set, it is added to the setting of `mml-secure-openpgp-sign-with-sender'." :group mime-security :type (repeat (string :tag "Key ID")) mml-smime-signers mml-secure-smime-signers "A list of your own key ID(s) which will be used to sign S/MIME messages.\nIf set, it is added to the setting of `mml-secure-smime-sign-with-sender'." (repeat (string :tag "Key ID")) mml1991-encrypt-to-self mml-secure-openpgp-encrypt-to-self mml2015-encrypt-to-self "List of own key ID(s) or t; determines additional recipients with OpenPGP.\nIf t, also encrypt to key for message sender; if list, encrypt to those keys.\nWith this variable, you can ensure that you can decrypt your own messages.\nAlternatives to this variable include Bcc'ing the message to yourself or\nusing the encrypt-to or hidden-encrypt-to option in gpg.conf (see man gpg(1)).\nNote that this variable and the encrypt-to option give away your identity\nfor *every* encryption without warning, which is not what you want if you are\nusing, e.g., remailers.\nAlso, use of Bcc gives away your identity for *every* encryption without\nwarning, which is a bug, see:\nhttps://debbugs.gnu.org/cgi/bugreport.cgi?bug=18718" (choice (const :tag "None" nil) (const :tag "From address" t) (repeat (string :tag "Key ID"))) mml-smime-encrypt-to-self mml-secure-smime-encrypt-to-self "List of own key ID(s) or t; determines additional recipients with S/MIME.\nIf t, also encrypt to key for message sender; if list, encrypt to those keys.\nWith this variable, you can ensure that you can decrypt your own messages.\nAlternatives to this variable include Bcc'ing the message to yourself or\nusing the encrypt-to option in gpgsm.conf (see man gpgsm(1)).\nNote that this variable and the encrypt-to option give away your identity\nfor *every* encryption without warning, which is not what you want if you are\nusing, e.g., remailers.\nAlso, use of Bcc gives away your identity for *every* encryption without\nwarning, which is a bug, see:\nhttps://debbugs.gnu.org/cgi/bugreport.cgi?bug=18718" (choice (const :tag "None" nil) (const :tag "From address" t) (repeat (string :tag "Key ID"))) mml2015-sign-with-sender mml-secure-openpgp-sign-with-sender "If t, use message sender to find an OpenPGP key to sign with.\nAlso use message's sender with GnuPG's --sender option." boolean mml-smime-sign-with-sender mml-secure-smime-sign-with-sender "If t, use message sender to find an S/MIME key to sign with." mml2015-always-trust mml-secure-openpgp-always-trust t "If t, skip key validation of GnuPG on encryption." mml-secure-fail-when-key-problem "If t, raise an error if some key is missing or several keys exist.\nOtherwise, ask the user." :version mml-secure-key-preferences '((OpenPGP (sign) (encrypt)) (CMS (sign) (encrypt))) "Protocol- and usage-specific fingerprints of preferred keys.\nThis variable is only relevant if a recipient owns multiple key pairs (for\nencryption) or you own multiple key pairs (for signing).  In such cases,\nyou will be asked which key(s) should be used, and your choice can be\ncustomized in this variable." (alist :key-type (symbol :tag "Protocol") :value-type (alist :key-type (symbol :tag "Usage") :value-type (alist :key-type (string :tag "Name") :value-type (repeat (string :tag "Fingerprint")))))] 11)
#@43 Return preferences for CONTEXT and USAGE.
(defalias 'mml-secure-cust-usage-lookup #[(context usage) "\306!	>\204\307\310\311D\"\210\312H\313\n\"A\313
\f\"*\207" [context cl-struct-epg-context-tags protocol mml-secure-key-preferences protocol-prefs usage type-of signal wrong-type-argument epg-context 1 assoc] 4 (#$ . 19991)])
#@69 Return fingerprints of preferred keys for CONTEXT, USAGE, and NAME.
(defalias 'mml-secure-cust-fpr-lookup #[(context usage name) "\305	\"\306\nA\"\211\205\fA*\207" [context usage usage-prefs name fprs mml-secure-cust-usage-lookup assoc] 4 (#$ . 20332)])
#@133 For CONTEXT, USAGE, and NAME record fingerprint(s) of KEYS.
If optional SAVE is not nil, save customized fingerprints.
Return keys.
(defalias 'mml-secure-cust-record-keys #[(context usage name keys &optional save) "\204\306\300!\210\307	\n\"\310\fA\"A\311\312\"\313
\314\315$
\2033\310\fA\"\241\210\202=\fBAB\241\210\203H\316\317\"\210,\207" [keys context usage usage-prefs name curr-fprs cl--assertion-failed mml-secure-cust-usage-lookup assoc mapcar mml-secure-fingerprint cl-union :test equal customize-save-variable mml-secure-key-preferences key-fprs new-fprs save] 5 (#$ . 20599)])
#@116 Remove keys for CONTEXT, USAGE, and NAME.
Return t if a customization for NAME was present (and has been removed).
(defalias 'mml-secure-cust-remove-keys #[(context usage name) "\305	\"\306\n\"\211\205\n\307\f\nA\"\241\210\310*\207" [context usage usage-prefs name current mml-secure-cust-usage-lookup assoc remove t] 5 (#$ . 21222)])
(defvar mml-secure-secret-key-id-list nil)
#@39 Record KEY-ID in list of secret keys.
(defalias 'mml-secure-add-secret-key-id #[(key-id) "	\235\203	\207	B\211\207" [key-id mml-secure-secret-key-id-list] 2 (#$ . 21612)])
#@60 Remove passwords from cache and clear list of secret keys.
(defalias 'mml-secure-clear-secret-key-id-list #[nil "\303\211\203\n@\304	!\210\nA\211\204\303*\303\211\207" [mml-secure-secret-key-id-list key-id --dolist-tail-- nil password-cache-remove] 3 (#$ . 21795)])
#@146 Return t if OpenPGP or S/MIME passphrases should be cached for PROTOCOL.
Passphrase caching in Emacs is NOT recommended.  Use gpg-agent instead.
(defalias 'mml-secure-cache-passphrase-p #[(protocol) "\305=\203	\206/\306\302!\203\n\206/\306\303!\203\206/\307=\205/	\206/\306\304!\205/\f\207" [protocol mml-secure-cache-passphrase mml2015-cache-passphrase mml1991-cache-passphrase mml-smime-cache-passphrase OpenPGP boundp CMS] 2 (#$ . 22079)])
#@131 Return time in seconds to cache passphrases for PROTOCOL.
Passphrase caching in Emacs is NOT recommended.  Use gpg-agent instead.
(defalias 'mml-secure-cache-expiry-interval #[(protocol) "\305=\203\306\301!\203	\206/\306\302!\203\n\206/\206/\307=\205/\306\304!\203.\f\206/\207" [protocol mml2015-passphrase-cache-expiry mml1991-passphrase-cache-expiry mml-secure-passphrase-cache-expiry mml-smime-passphrase-cache-expiry OpenPGP boundp CMS] 2 (#$ . 22544)])
#@91 Ask for passphrase in CONTEXT for KEY-ID for STANDARD.
The passphrase is read and cached.
(defalias 'mml-secure-passphrase-callback #[(context key-id standard) "\306=\203\f\307	\310#\207\311=\203\312\202\313\"\314\311=\203(\315\2029\f\2035\316\317\fA#\2029\316\320\"\n\"\211\205d\321\322	!>\204Q\323\324\325	D\"\210	\326H!\327\n
\"\210)\330\n!\210\331
!+\207" [key-id context password-cache-key-id epg-user-id-alist entry passphrase SYM epa-passphrase-callback-function nil PIN "PIN" assoc password-read "Passphrase for PIN: " format "Passphrase for %s %s: " "Passphrase for %s: " mml-secure-cache-expiry-interval type-of signal wrong-type-argument epg-context 1 password-cache-add mml-secure-add-secret-key-id copy-sequence cl-struct-epg-context-tags password-cache-expiry] 6 (#$ . 23024)])
#@69 Check whether KEY has a non-revoked, non-expired UID for RECIPIENT.
(defalias 'mml-secure-check-user-id #[(key recipient) "\306!	>\204\307\310\311D\"\210\312H\3132\242\n\314\211\203\235\f@\306!
>\2041\307\310\315D\"\210\316H;\203\226\3171T\320\306!
>\204L\307\310\315D\"\210\316H!0\202V\210\314@\203\226\320\306!
>\204j\307\310\315D\"\210\316H!@\227\320!@\227\232\203\226\306!
>\204\211\307\310\315D\"\210\321H\322>\204\226\323\313\324\"\210\fA\211\204\314*\3140)\207" [key cl-struct-epg-key-tags uids uid --dolist-tail-- cl-struct-epg-user-id-tags type-of signal wrong-type-argument epg-key 3 break nil epg-user-id 2 (error) mail-header-parse-address 1 (revoked expired) throw t recipient] 6 (#$ . 23849)])
#@72 Return t if keyring for CONTEXT contains secret key for public SUBKEY.
(defalias 'mml-secure-secret-key-exists-p #[(context subkey) "\306!	>\204\307\310\311D\"\210\312H\313\n\314#\211G\211\315Y\203(\316\317
\n#\210
\320U+\207" [subkey cl-struct-epg-sub-key-tags fpr context candidates candno type-of signal wrong-type-argument epg-sub-key 9 epg-list-keys secret 2 error "Found %d secret keys with same fingerprint %s" 1] 5 (#$ . 24602)])
#@516 Check whether in CONTEXT the public KEY has a usable subkey for USAGE.
This is the case if KEY is not disabled, and there is a subkey for
USAGE that is neither revoked nor expired.  Additionally, if optional
FINGERPRINT is present and if it is not the primary key's fingerprint, then
the returned subkey must have that FINGERPRINT.  FINGERPRINT must consist of
hexadecimal digits only (no leading "0x" allowed).
If USAGE is not `encrypt', then additionally an appropriate secret key must
be present in the keyring.
(defalias 'mml-secure-check-sub-key #[(context key usage &optional fingerprint) "\306!	>\204\307\310\311D\"\210\312H\211@\306!\f>\204%\307\310\313D\"\210\314H\315\306!\f>\2049\307\310\313D\"\210\312H>?\205\356\3162\356\n\317\211\203\350@\306!\f>\204g\307\310\313D\"\210\312H>\203\337\306!\f>\204\200\307\310\313D\"\210\320H\321>\204\337\322=\204\231\323\"\203\337\203\332\324P
\317\325\326#)\266\203\204\332\324P\306!\f>\204\307\307\310\313D\"\210\314H\317\325\326#)\266\203\203\337\327\316\325\"\210A\211\204O\317*\3170+\207" [key cl-struct-epg-key-tags subkeys primary cl-struct-epg-sub-key-tags fpr type-of signal wrong-type-argument epg-key 2 epg-sub-key 9 disabled break nil 1 (revoked expired) encrypt mml-secure-secret-key-exists-p "$" t string-match throw subkey --dolist-tail-- usage context fingerprint inhibit-changing-match-data] 8 (#$ . 25057)])
#@575 In CONTEXT return a list of keys for NAME and USAGE.
If USAGE is `encrypt' public keys are returned, otherwise secret ones.
Only non-revoked and non-expired keys are returned whose primary key is
not disabled.
NAME can be an e-mail address or a key ID.
If NAME just consists of hexadecimal digits (possibly prefixed by "0x"), it
is treated as key ID for which at most one key must exist in the keyring.
Otherwise, NAME is treated as user ID, for which no keys are returned if it
is expired or revoked.
If optional JUSTONE is not nil, return the first key instead of a list.
(defalias 'mml-secure-find-usable-keys #[(context name usage &optional justone) "\306	\"\307\310	\"\311\312	\"\313\203#\nG\312Y\203#\314\315	#\210\3162o\n\313\211\203i@\204B\317	\"\203`\320\f$\203`\203[\321\316\"\210\202`
BA\211\2041\313
*0,\207" [context name keys iskeyid fingerprint result epg-list-keys string-match "\\(0x\\)?\\([[:xdigit:]]\\{8,\\}\\)" match-string 2 nil error "Name %s (for %s) looks like a key ID but multiple keys found" break mml-secure-check-user-id mml-secure-check-sub-key throw usage key --dolist-tail-- justone] 6 (#$ . 26524)])
#@388 Return list of preferred keys in CONTEXT for NAMES and USAGE.
This inspects the keyrings to find keys for each name in NAMES.  If several
keys are found for a name, `mml-secure-select-keys' is used to look for
customized preferences or have the user select preferable ones.
When `mml-secure-fail-when-key-problem' is t, fail with an error in
case of missing, outdated, or multiple keys.
(defalias 'mml-secure-select-preferred-keys #[(context names usage) "\301\302\303\304\"\"\207" [names apply nconc mapcar #[(name) "\306	\n#\211G\211\307U\203&
\204\310\311\312\n	#!?\2056\313\314\n	#\2026\f\315U\2030\2026\316	\n$*\207" [context name usage keys keyno mml-secure-fail-when-key-problem mml-secure-find-usable-keys 0 y-or-n-p format "No %s key for %s; skip it? " error "No %s key for %s" 1 mml-secure-select-keys] 6]] 5 (#$ . 27712)])
#@36 Return fingerprint for public KEY.
(defalias 'mml-secure-fingerprint #[(key) "\303\211!	>\204\304\305\306D\"\210\307H@!\n>\2043\304\305\310\303!	>\204,\304\305\306D\"\210\307H@D\"\210\303!	>\204B\304\305\306D\"\210\307H@\311H\207" [key cl-struct-epg-key-tags cl-struct-epg-sub-key-tags type-of signal wrong-type-argument epg-key 2 epg-sub-key 9] 7 (#$ . 28566)])
#@50 Filter KEYS to subset with fingerprints in FPRS.
(defalias 'mml-secure-filter-keys #[(keys fprs) "\205\302@!	\235\203@\303A	\"B\207\303A	\"\207" [keys fprs mml-secure-fingerprint mml-secure-filter-keys] 4 (#$ . 28949)])
#@80 Normalize NAME to be used for customization.
Currently, remove ankle brackets.
(defalias 'mml-secure-normalize-cust-name #[(name) "\301\302\"\203\f\303\304\"\207\207" [name string-match "^<\\(.*\\)>$" match-string 1] 3 (#$ . 29184)])
#@257 In CONTEXT for NAME select among KEYS for USAGE.
KEYS should be a list with multiple entries.
NAME is normalized first as customized keys are inspected.
When `mml-secure-fail-when-key-problem' is t, fail with an error in case of
outdated or multiple keys.
(defalias 'mml-secure-select-keys #[(context name keys usage) "\306!\307\n	#\310\311
\"\f\203M\312\f\"\203#\313
\f\"\202e\314\n	#\210\315\f\"\203=\316\317	#\202I\320\n	
\321\322	#%)\202e\203Z\316\323	#\202e\320\n	
\321\324	#%+\207" [name nname context usage fprs keys mml-secure-normalize-cust-name mml-secure-cust-fpr-lookup mapcar mml-secure-fingerprint gnus-subsetp mml-secure-filter-keys mml-secure-cust-remove-keys gnus-setdiff error "Customization of %s keys for %s outdated" mml-secure-select-keys-1 format "Customized keys\n (%s)\nfor %s not available any more.\nSelect anew.  " "Multiple %s keys for %s" "Multiple %s keys for:\n %s\nSelect preferred one(s).  " usable-fprs diff mml-secure-fail-when-key-problem] 9 (#$ . 29429)])
#@98 In CONTEXT for NAME let user select among KEYS for USAGE, showing MESSAGE.
Return selected keys.
(defalias 'mml-secure-select-keys-1 #[(context name keys usage message) "\306	\"\211G\307\n\203*\310\311\312
$!\203&\313
\n\314%\202<\n\202<\310\311\315
#!?\205<\316\317
#+\207" [message keys selected selno message-truncate-lines usage epa--select-keys nil y-or-n-p format "%d %s key(s) selected.  Store for %s? " mml-secure-cust-record-keys save "No %s key for %s; skip it? " error "No %s key for %s" name context] 7 (#$ . 30461)])
#@307 Determine signer names for PROTOCOL and message from SENDER.
Returned names may be e-mail addresses or key IDs and are determined based
on `mml-secure-openpgp-signers' and `mml-secure-openpgp-sign-with-sender' with
OpenPGP or `mml-secure-smime-signers' and `mml-secure-smime-sign-with-sender'
with S/MIME.
(defalias 'mml-secure-signer-names #[(protocol sender) "\306=\203\307	\n\205\205\310\311QC\"\207\307\f
\205&\205&\310\311QC\"\207" [protocol mml-secure-openpgp-signers mml-secure-openpgp-sign-with-sender sender mml-secure-smime-signers mml-secure-smime-sign-with-sender OpenPGP append "<" ">"] 5 (#$ . 31018)])
#@171 Determine signing keys in CONTEXT from SIGNER-NAMES.
If `mm-sign-option' is `guided', the user is asked to choose.
Otherwise, `mml-secure-select-preferred-keys' is used.
(defalias 'mml-secure-signers #[(context signer-names) "\303=\203
\304	\305\n\306$\207\307	\n\310#\207" [mm-sign-option context signer-names guided epa-select-keys "Select keys for signing.\nIf no one is selected, default secret key is used.  " t mml-secure-select-preferred-keys sign] 5 (#$ . 31655)])
#@133 Determine additional recipients based on encrypt-to-self variables.
PROTOCOL specifies OpenPGP or S/MIME for a message from SENDER.
(defalias 'mml-secure-self-recipients #[(protocol sender) "\305=\203\n	\202\n\211\205<\203\202\fC)\207" [protocol mml-secure-openpgp-encrypt-to-self mml-secure-smime-encrypt-to-self encrypt-to-self sender OpenPGP] 3 (#$ . 32137)])
#@131 Determine encryption recipients.
PROTOCOL specifies OpenPGP or S/MIME with matching CONTEXT and CONFIG
for a message from SENDER.
(defalias 'mml-secure-recipients #[(protocol context config sender) "\305\306\307\310\311\312\313!\206\314\313\315\316!\"\317\"\"\"\211\320	\n\"\244\210\321=\203,\322\f\323#\202:\324\f\325#\211\204:\326\327!\210)\207" [recipients protocol sender mm-encrypt-option context apply nconc mapcar #[(recipient) "\302	\"\206\f\303	\304QC\207" [config recipient epg-expand-group "<" ">"] 3] split-string message-options-get message-recipients message-options-set read-string "Recipients: " "[ \f	\n
,]+" mml-secure-self-recipients guided epa-select-keys "Select recipients for encryption.\nIf no one is selected, symmetric encryption will be performed.  " mml-secure-select-preferred-keys encrypt error "No recipient specified"] 10 (#$ . 32520)])
(defalias 'mml-secure-epg-encrypt #[(protocol cont &optional sign) "\306!\307\310!\311\312!\313	\n$\314\"\315\211 !\203g\316	
\" \317	!\">\2049\320\321\322	D\"\210	\211#\323 I\210)\310=\203g$\203g\317	!\">\204^\320\321\322	D\"\210	\211%\324I\210)\310=\203\237\317	!\">\204}\320\321\322	D\"\210	\211&\325\326I\210)\317	!\">\204\226\320\321\322	D\"\210	\211'\327\326I\210)\330!\203\254\331	\332B\"\210\3331\323\310=\203\303\334	\335 \f!(%\202\311\334	\335 \f#\315\211)0\202\341*\336 \210\320*@*A\")\210.\207" [protocol context config sender recipients signer-names epg-make-context epg-find-configuration OpenPGP message-options-get message-sender mml-secure-recipients mml-secure-signer-names nil mml-secure-signers type-of signal wrong-type-argument epg-context 13 14 4 t 5 mml-secure-cache-passphrase-p epg-context-set-passphrase-callback mml-secure-passphrase-callback (error) epg-encrypt-string buffer-string mml-secure-clear-secret-key-id-list cipher signers sign cl-struct-epg-context-tags #1=#:v mml-secure-openpgp-sign-with-sender #2=#:v #3=#:v #4=#:v mml-secure-openpgp-always-trust mml-secure-secret-key-id-list error] 7])
(defalias 'mml-secure-epg-sign #[(protocol mode) "\306!\307\310!\311\n\"\312	\"\313\211$\314=\203m\315	!%>\204-\316\317\320	D\"\210	\211&\321\322I\210)\315	!%>\204F\316\317\320	D\"\210	\211'\323\322I\210)(\203m\315	!%>\204d\316\317\320	D\"\210	\211)\324\nI\210)\315	!%>\204}\316\317\320	D\"\210	\211*\325\fI\210)\326!\203\223\327	\330B\"\210\3311\272\314=\203\247\332	\333 +#\202\261\332	\334\335\336\333 #\322#\313\211,0\202\310-\337 \210\316-@-A\")\210\340	\341\"\203\360\340	\341\"@.\315.!/>\204\351\316\317\342.D\"\210.\343H)$
$.B\207" [protocol context sender signer-names signers signature epg-make-context message-options-get message-sender mml-secure-signer-names mml-secure-signers nil OpenPGP type-of signal wrong-type-argument epg-context 4 t 5 14 13 mml-secure-cache-passphrase-p epg-context-set-passphrase-callback mml-secure-passphrase-callback (error) epg-sign-string buffer-string replace-regexp-in-string "\n" "
\n" mml-secure-clear-secret-key-id-list epg-context-result-for sign epg-new-signature 3 micalg cl-struct-epg-context-tags #1=#:v #2=#:v mml-secure-openpgp-sign-with-sender #3=#:v #4=#:v mode mml-secure-secret-key-id-list error cl-x cl-struct-epg-new-signature-tags] 7])
(provide 'mml-sec)

Zerion Mini Shell 1.0