%PDF- <> %âãÏÓ endobj 2 0 obj <> endobj 3 0 obj <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 28 0 R 29 0 R] /MediaBox[ 0 0 595.5 842.25] /Contents 4 0 R/Group<>/Tabs/S>> endobj ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<>endobj 2 0 obj<> endobj 2 0 obj<>endobj 2 0 obj<>es 3 0 R>> endobj 2 0 obj<> ox[ 0.000000 0.000000 609.600000 935.600000]/Fi endobj 3 0 obj<> endobj 7 1 obj<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Subtype/Form>> stream
;ELC ;;; Compiled ;;; in Emacs version 25.2.1 ;;; with all optimizations. ;;; This file uses dynamic docstrings, first added in Emacs 19.29. ;;; This file does not contain utf-8 non-ASCII characters, ;;; and so can be loaded in Emacs versions earlier than 23. ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; (byte-code "\300\301!\210\302\303!\203 \300\304!\210\202 \300\305!\210\306\307!\203# \310\311\307\"\210\202. \306\312!\203. \310\311\313\"\210\314\315\316\317\320\321%\210\322\323\316\324\325\326\320\315&\210\322\327\316\330\325\331\320\315&\210\322\332\316\333\334\335\325\336\320\315& \210\322\337\340\341\325\342\320\315&\210\322\343\344\345\325\346\320\315&\210\322\347\350\351\334\335\325\352\320\315& \210\322\353\316\354\325\355\320\315&\210\322\356\316\357\334\335\325\360\320\315& \210\322\361\316\362\325\363\334\364\320\315& \207" [require dig locate-library "password-cache" password-cache password fboundp replace-in-string defalias smime-replace-in-string replace-regexp-in-string #[(string regexp newtext &optional literal) "\304 \n\305%\207" [regexp newtext string literal replace-regexp-in-string nil] 6 "Replace all matches for REGEXP with NEWTEXT in STRING.\nIf LITERAL is non-nil, insert NEWTEXT literally. Return a new\nstring containing the replacements.\n\nThis is a compatibility function for different Emacsen."] custom-declare-group smime nil "S/MIME configuration." :group mime custom-declare-variable smime-keys "*Map mail addresses to a file containing Certificate (and private key).\nThe file is assumed to be in PEM format. You can also associate additional\ncertificates to be sent with every message to each address." :type (repeat (list (string :tag "Mail address") (file :tag "File name") (repeat :tag "Additional certificate files" (file :tag "File name")))) smime-CA-directory "*Directory containing certificates for CAs you trust.\nDirectory should contain files (in PEM format) named to the X.509\nhash of the certificate. This can be done using OpenSSL such as:\n\n$ ln -s ca.pem \\=`openssl x509 -noout -hash -in ca.pem\\=`.0\n\nwhere `ca.pem' is the file containing a PEM encoded X.509 CA\ncertificate." (choice (const :tag "none" nil) directory) smime-CA-file "*Files containing certificates for CAs you trust.\nFile should contain certificates in PEM format." :version "22.1" (choice (const :tag "none" nil) file) smime-certificate-directory "~/Mail/certs/" "*Directory containing other people's certificates.\nIt should contain files named to the X.509 hash of the certificate,\nand the files themselves should be in PEM format." directory smime-openssl-program (and (condition-case nil (eq 0 (call-process "openssl" nil nil nil "version")) (error nil)) "openssl") "*Name of OpenSSL binary." string smime-encrypt-cipher "-des3" "*Cipher algorithm used for encryption." (choice (const :tag "Triple DES" "-des3") (const :tag "DES" "-des") (const :tag "RC2 40 bits" "-rc2-40") (const :tag "RC2 64 bits" "-rc2-64") (const :tag "RC2 128 bits" "-rc2-128")) smime-crl-check "*Check revocation status of signers certificate using CRLs.\nEnabling this will have OpenSSL check the signers certificate\nagainst a certificate revocation list (CRL).\n\nFor this to work the CRL must be up-to-date and since they are\nnormally updated quite often (i.e., several times a day) you\nprobably need some tool to keep them up-to-date. Unfortunately\nGnus cannot do this for you.\n\nThe CRL should either be appended (in PEM format) to your\n`smime-CA-file' or be located in a file (also in PEM format) in\nyour `smime-certificate-directory' named to the X.509 hash of the\ncertificate with .r0 as file name extension.\n\nAt least OpenSSL version 0.9.7 is required for this to work." (choice (const :tag "No check" nil) (const :tag "Check certificate" "-crl_check") (const :tag "Check certificate chain" "-crl_check_all")) smime-dns-server "*DNS server to query certificates from.\nIf nil, use system defaults." (choice (const :tag "System defaults") string) smime-ldap-host-list "A list of LDAP hosts with S/MIME user certificates.\nIf needed search base, binddn, passwd, etc. for the LDAP host\nmust be set in `ldap-host-parameters-alist'." (repeat (string :tag "Host name")) "23.1"] 10) (defvar smime-details-buffer "*OpenSSL output*") (byte-code "\300\301\302\303!\203\f \303\202 \304\"\207" [defalias smime-make-temp-file fboundp make-temp-file #[(prefix &optional dir-flag) "\302\303!\304\305!\203 \305 \202 \"\207" [prefix temporary-file-directory expand-file-name make-temp-name fboundp temp-directory] 4]] 4) #@137 Asks the passphrase to unlock the secret key. If `cache-key' and `password-cache' is non-nil then cache the password under `cache-key'. (defalias 'smime-ask-passphrase #[(&optional cache-key) "\302\303\"\211\304\230?\205 )\207" [cache-key passphrase password-read-and-add "Passphrase for secret key (RET for no passphrase): " ""] 4 (#$ . 4669)]) (defalias 'smime-call-openssl-region #[(b e buf &rest args) "\306\307 \n\310\310\f&\311 \312\"\203 \313\202X \311 \314\"\203&