Server IP : 111.118.215.189 / Your IP : 18.117.158.174 Web Server : Apache System : Linux md-in-83.webhostbox.net 4.19.286-203.ELK.el7.x86_64 #1 SMP Wed Jun 14 04:33:55 CDT 2023 x86_64 User : a1673wkz ( 2475) PHP Version : 8.2.25 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON Directory (0755) : /usr/share/emacs/24.3/lisp/gnus/ |
[ Home ] | [ C0mmand ] | [ Upload File ] |
---|
;ELC ;;; Compiled by mockbuild@buildfarm06-new.corp.cloudlinux.com on Fri Oct 11 10:09:32 2024 ;;; from file /builddir/build/BUILD/emacs-24.3/lisp/gnus/auth-source.el ;;; in Emacs version 24.3.1 ;;; with all optimizations. ;;; This file uses dynamic docstrings, first added in Emacs 19.29. ;;; This file does not contain utf-8 non-ASCII characters, ;;; and so can be loaded in Emacs versions earlier than 23. ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; (byte-code "\300\301!\210\300\302!\210\300\303!\210\300\304!\210\305\306\307\"\210\305\310\307\"\210\305\311\307\"\210\305\312\307\"\210\305\313\307\"\210\305\314\307\"\210\305\315\307\"\210\305\316\317\"\210\305\320\321\"\210\305\322\321\"\210\305\323\321\"\210\305\324\321\"\210\305\325\321\"\210\305\326\321\"\210\305\327\330\"\210\305\331\330\"\210\305\332\330\"\210\305\333\330\"\210\305\334\330\"\210\305\335\336\337\340$\210\341\342\337\343\344\345\346\347&\210\350\351\352\353\344\354\346\342\355\356& \210\357\360\337\361\337$\210\350\362\363\364\346\342\344\365\355\366& \207" [require password-cache mm-util gnus-util eieio autoload secrets-create-item "secrets" secrets-delete-item secrets-get-alias secrets-get-attributes secrets-get-secret secrets-list-collections secrets-search-items rfc2104-hash "rfc2104" plstore-open "plstore" plstore-find plstore-put plstore-delete plstore-save plstore-get-file epg-make-context "epg" epg-context-set-passphrase-callback epg-decrypt-string epg-context-set-armor epg-encrypt-string help-mode "help-mode" nil t custom-declare-group auth-source "Authentication sources." :version "23.1" :group gnus custom-declare-variable auth-source-cache-expiry 7200 "How many seconds passwords are cached, or nil to disable\nexpiring. Overrides `password-cache-expiry' through a\nlet-binding." "24.1" :type (choice (const :tag "Never" nil) (const :tag "All Day" 86400) (const :tag "2 Hours" 7200) (const :tag "30 Minutes" 1800) (integer :tag "Seconds")) eieio-defclass auth-source-backend ((type :initarg :type :initform 'netrc :type symbol :custom symbol :documentation "The backend type.") (source :initarg :source :type string :custom string :documentation "The backend source.") (host :initarg :host :initform t :type t :custom string :documentation "The backend host.") (user :initarg :user :initform t :type t :custom string :documentation "The backend user.") (port :initarg :port :initform t :type t :custom string :documentation "The backend protocol.") (data :initarg :data :initform nil :documentation "Internal backend data.") (create-function :initarg :create-function :initform ignore :type function :custom function :documentation "The create function.") (search-function :initarg :search-function :initform ignore :type function :custom function :documentation "The search function.")) auth-source-protocols '((imap "imap" "imaps" "143" "993") (pop3 "pop3" "pop" "pop3s" "110" "995") (ssh "ssh" "22") (sftp "sftp" "115") (smtp "smtp" "25")) "List of authentication protocols and their names" "23.2" (repeat :tag "Authentication Protocols" (cons :tag "Protocol Entry" (symbol :tag "Protocol") (repeat :tag "Names" (string :tag "Name"))))] 10) (defconst auth-source-protocols-customize (mapcar #[(a) "\242\302\303\304 !\226 F)\207" [a p const :tag symbol-name] 4] auth-source-protocols)) #@57 Defaults for creating token values. Usually let-bound. (defvar auth-source-creation-defaults nil (#$ . 3403)) #@55 Default prompts for token values. Usually let-bound. (defvar auth-source-creation-prompts nil (#$ . 3520)) (byte-code "\300\301\302\303#\210\304\305\306\307\310\311\312\313\314\315& \210\304\316\317\320\310\311\312\313\314\321\322\323\324\325\326\327\321\325\330\331\332\325\333\334\335!\2036 \335J@\2027 \336F\337BBBBB\340BBFF& \207" [make-obsolete auth-source-hide-passwords nil "Emacs 24.1" custom-declare-variable auth-source-save-behavior 'ask "If set, auth-source will respect it for save behavior." :group auth-source :version "23.2" :type (choice :tag "auth-source new token save behavior" (const :tag "Always save" t) (const :tag "Never save" nil) (const :tag "Ask" ask)) auth-source-netrc-use-gpg-tokens 'never "Set this to tell auth-source when to create GPG password\ntokens in netrc files. It's either an alist or `never'.\nNote that if EPA/EPG is not available, this should NOT be used." choice (const :tag "Always use GPG password tokens" (t gpg)) (const :tag "Never use GPG password tokens" never) repeat :tag "Use a lookup list" list "Matcher" (const :tag "Match anything" t) const "The EPA encrypted file extensions" boundp epa-file-auto-mode-alist-entry "\\.gpg\\'" ((regexp :tag "Regular expression")) ((choice :tag "What to do" (const :tag "Save GPG-encrypted password tokens" gpg) (const :tag "Don't encrypt tokens" never)))] 25) (defvar auth-source-magic "auth-source-magic ") (byte-code "\301\302\303\304\305\306\307\310\311\312& \210\301\313\314\315\305\306\307\310\311\316& \210\301\317\320\321\305\306\307\322\311\323\324\325\326\327\330\331\332\333\334\335\324\336\337\340\323\324\341\342\303\326\324\343\344\335\324\345\346\326\324\345\347BBBB\257\350BBBBB\257\257\257F& \210\301\351\303\352\305\306\307\322\311\353& \207" [auth-source-protocols-customize custom-declare-variable auth-source-do-cache t "Whether auth-source should cache information with `password-cache'." :group auth-source :version "23.2" :type boolean auth-source-debug nil "Whether auth-source should log debug messages.\n\nIf the value is nil, debug messages are not logged.\n\nIf the value is t, debug messages are logged with `message'. In\nthat case, your authentication data will be in the clear (except\nfor passwords).\n\nIf the value is a function, debug messages are logged by calling\n that function using the same arguments as `message'." (choice :tag "auth-source debugging mode" (const :tag "Log using `message' to the *Messages* buffer" t) (const :tag "Log all trivia with `message' to the *Messages* buffer" trivia) (function :tag "Function that takes arguments like `message'") (const :tag "Don't log anything" nil)) auth-sources '("~/.authinfo" "~/.authinfo.gpg" "~/.netrc") "List of authentication sources.\n\nThe default will get login and password information from\n\"~/.authinfo.gpg\", which you should set up with the EPA/EPG\npackages to be encrypted. If that file doesn't exist, it will\ntry the unencrypted version \"~/.authinfo\" and the famous\n\"~/.netrc\" file.\n\nSee the auth.info manual for details.\n\nEach entry is the authentication type with optional properties.\n\nIt's best to customize this with `M-x customize-variable' because the choices\ncan get pretty complex." "24.1" repeat :tag "Authentication Sources" choice (string :tag "Just a file") (const :tag "Default Secrets API Collection" 'default) (const :tag "Login Secrets API Collection" "secrets:Login") (const :tag "Temp Secrets API Collection" "secrets:session") (const :tag "Default internet Mac OS Keychain" macos-keychain-internet) (const :tag "Default generic Mac OS Keychain" macos-keychain-generic) list "Source definition" (const :format #1="" :value :source) (choice :tag "Authentication backend choice" (string :tag "Authentication Source (file)") (list :tag "Secret Service API/KWallet/GNOME Keyring" (const :format #1# :value :secrets) (choice :tag "Collection to use" (string :tag "Collection name") (const :tag "Default" 'default) (const :tag "Login" "Login") (const :tag "Temporary" "session"))) (list :tag "Mac OS internet Keychain" (const :format #1# :value :macos-keychain-internet) (choice :tag "Collection to use" (string :tag "internet Keychain path") (const :tag "default" 'default))) (list :tag "Mac OS generic Keychain" (const :format #1# :value :macos-keychain-generic) (choice :tag "Collection to use" (string :tag "generic Keychain path") (const :tag "default" 'default)))) "Extra Parameters" :inline "Extra parameter" (list :tag "Host" (const :format #1# :value :host) (choice :tag "Host (machine) choice" (const :tag "Any" t) (regexp :tag "Regular expression"))) "Protocol" (const :format #1# :value :port) (const :tag "Any" t) ((list :tag "User" :inline t (const :format #1# :value :user) (choice :tag "Personality/Username" (const :tag "Any" t) (string :tag "Name")))) auth-source-gpg-encrypt-to "List of recipient keys that `authinfo.gpg' encrypted to.\nIf the value is not a list, symmetric encryption will be used." (choice (const :tag "Symmetric encryption" t) (repeat :tag "Recipient public keys" (string :tag "Recipient public key")))] 42) (defalias 'auth-source-do-debug #[(&rest msg) "\205 \302\303 \"\207" [auth-source-debug msg apply auth-source-do-warn] 3]) (defalias 'auth-source-do-trivia #[(&rest msg) "\302=\204\f \303!\205 \304\305 \"\207" [auth-source-debug msg trivia functionp apply auth-source-do-warn] 3]) (defalias 'auth-source-do-warn #[(&rest msg) "\302\303!\203 \202\f \304 \"\207" [auth-source-debug msg apply functionp message] 3]) #@236 Read one of CHOICES by `read-char-choice', or `read-char'. `dropdown-list' support is disabled because it doesn't work reliably. Only one of CHOICES will be returned. The PROMPT is augmented with "[a/b/c] " if CHOICES is '(?a ?b ?c). (defalias 'auth-source-read-char-choice #[(prompt choices) "\205_ \306\307\310\211 :\203\"