Current File : //proc/thread-self/root/kunden/usr/share/emacs/27.2/lisp/net/nsm.elc |
;ELC
;;; Compiled
;;; in Emacs version 27.2
;;; with all optimizations.
;;; This file contains utf-8 non-ASCII characters,
;;; and so cannot be loaded into Emacs 22 or earlier.
(and (boundp 'emacs-version)
(< (aref emacs-version (1- (length emacs-version))) ?A)
(string-lessp emacs-version "23")
(error "`%s' was compiled for Emacs 23 or later" #$))
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
(byte-code "\300\301!\210\300\302!\210\300\303!\210\300\304!\210\300\305!\207" [require cl-lib rmc subr-x seq map] 2)
(defvar nsm-permanent-host-settings nil)
(defvar nsm-temporary-host-settings nil)
(byte-code "\300\301\302\303\304\305\306\307&\210\310\311\312\313\314DD\315\304\305\316\317&\210\310\320\312\313\321DD\322\304\323\316\324&\210\310\325\312\313\326DD\327\304\305\316\330&\210\310\331\312\313\332DD\333\304\305\316\334&\207" [custom-declare-group nsm nil "Network Security Manager" :version "25.1" :group comm custom-declare-variable network-security-level funcall function #[0 "\300\207" [medium] 1] "How secure the network should be.\nIf a potential problem with the security of the network\nconnection is found, the user is asked to give input into how the\nconnection should be handled.\n\nThe following values are possible:\n\n`low': No checks are performed: This is extremely insecure.\n`medium': Default. Suitable for most circumstances.\n`high': Warns about additional issues not enabled in `medium' due to\ncompatibility concerns.\n`paranoid': On this level, the user is queried for most new connections.\n\nSee the Emacs manual for a description of all things that are\nchecked and warned against." :type (choice (const :tag "Low" low) (const :tag "Medium" medium) (const :tag "High" high) (const :tag "Paranoid" paranoid)) nsm-trust-local-network #[0 "\300\207" [nil] 1] "Disable warnings when visiting trusted hosts on local networks.\n\nThe default suite of TLS checks in NSM is designed to follow the\nmost current security best practices. Under some situations,\nsuch as attempting to connect to an email server that do not\nfollow these practices inside a school or corporate network, NSM\nmay produce warnings for such occasions. Setting this option to\na non-nil value, or a zero-argument function that returns non-nil\ntells NSM to skip checking for potential TLS vulnerabilities when\nconnecting to hosts on a local network.\n\nMake sure you know what you are doing before enabling this\noption." "27.1" (choice (const :tag "On" t) (const :tag "Off" nil) (function :tag "Custom function")) nsm-settings-file #[0 "\301\302\"\207" [user-emacs-directory expand-file-name "network-security.data"] 3] "The file the security manager settings will be stored in." file nsm-save-host-names #[0 "\300\207" [nil] 1] "If non-nil, always save host names in the structures in `nsm-settings-file'.\nBy default, only hosts that have exceptions have their names\nstored in plain text." boolean] 8)
#@116 If non-nil, the connection is opened in a non-interactive context.
This means that no queries should be performed.
(defvar nsm-noninteractive nil (#$ . 2933))
#@781 Verify the security status of PROCESS that's connected to HOST:PORT.
If PROCESS is a gnutls connection, the certificate validity will
be examined. If it's a non-TLS connection, it may be compared
against previous connections. If the function determines that
there is something odd about the connection, the user will be
queried about what to do about it.
The process is returned if everything is OK, and otherwise, the
process will be deleted and nil is returned.
If SAVE-FINGERPRINT, always save the fingerprint of the
server (if the connection is a TLS connection). This is useful
to keep track of the TLS status of STARTTLS servers.
If WARN-UNENCRYPTED, query the user if the connection is
unencrypted.
(fn PROCESS HOST PORT &optional SAVE-FINGERPRINT WARN-UNENCRYPTED)
(defalias 'nsm-verify-connection #[1283 "\300!\301\"\302!\303!\204 \304\202P \204'