40b6d2ce635c583736b3b505aab41ffcfe586e10
[elisp/gnus-doc-ja.git] / auth-ja.texi
1 \input texinfo                  @c -*-texinfo-*-
2 @setfilename auth-ja
3 @settitle Emacs auth-source Library @value{VERSION}
4
5 @set VERSION 0.1
6
7 @copying
8 \e$B$3$N%U%!%$%k$O\e(B Emacs auth-source \e$B%i%$%V%i%j!<$r@bL@$7$^$9!#\e(B
9
10 Copyright @copyright{} 2008, 2009 Free Software Foundation, Inc.
11
12 @quotation
13 Permission is granted to copy, distribute and/or modify this document
14 under the terms of the GNU Free Documentation License, Version 1.3 or
15 any later version published by the Free Software Foundation; with no
16 Invariant Sections, with the Front-Cover texts being ``A GNU Manual,''
17 and with the Back-Cover Texts as in (a) below.  A copy of the license
18 is included in the section entitled ``GNU Free Documentation License''
19 in the Emacs manual.
20
21 \e$B$3$NJ8=q$r!"%U%j!<%=%U%H%&%'%":bCDH/9T$N\e(B GNU \e$B%U%j!<J8=qMxMQ5vBz7@Ls=q\e(B
22 \e$BBh\e(B 1.3 \e$BHG$^$?$O$=$l0J9_$NHG$,Dj$a$k>r7o$N2<$GJ#@=!"G[I[!"$"$k$$$OJQ99$9\e(B
23 \e$B$k$3$H$r5v2D$7$^$9!#JQ99IT2DItJ,$O;XDj$7$^$;$s!#!H\e(BA GNU Manual\e$B!I$OI=I=;f\e(B
24 \e$B%F%-%9%H!"0J2<$N\e(B (a) \e$B$ON"I=;f%F%-%9%H$G$9!#$3$NMxMQ5vBz7@Ls=q$NJ#<L\e(B
25 \e$B$O\e(B Emacs \e$B%^%K%e%"%k$N!V\e(BGNU \e$B%U%j!<J8=qMxMQ5vBz7@Ls=q!W$H$$$&>O$K4^$^$l$F\e(B
26 \e$B$$$^$9!#\e(B
27
28 (a) The FSF's Back-Cover Text is: ``You have the freedom to copy and
29 modify this GNU manual.  Buying copies from the FSF supports it in
30 developing GNU and promoting software freedom.''
31
32 (a) FSF \e$B$NN"I=;f%F%-%9%H\e(B:\e$B!V$"$J$?$K$O$3$N\e(B GNU Manual \e$B$rJ#@=$7$?$jJQ99$9\e(B
33 \e$B$k<+M3$,$"$j$^$9!#\e(BFSF \e$B$+$i$NJ#<L$N9XF~$O\e(B GNU \e$B$N3+H/$H%=%U%H%&%'%"$N<+M3\e(B
34 \e$B$NB%?J$r;Y1g$7$^$9!#!W\e(B
35
36 This document is part of a collection distributed under the GNU Free
37 Documentation License.  If you want to distribute this document
38 separately from the collection, you can do so by adding a copy of the
39 license to the document, as described in section 6 of the license.
40
41 \e$B$3$NJ8=q$O!V\e(BGNU \e$B%U%j!<J8=qMxMQ5vBz7@Ls=q!W$K4p$E$$$FG[I[$5$l$?<}=8Cx:nJ*\e(B
42 \e$B$N0lIt$G$9!#$b$7$"$J$?$,$3$NJ8=q$r<}=8Cx:nJ*$+$iJ,N%$7$FG[I[$7$?$$$H$-$O!"\e(B
43 \e$B7@Ls=q$NBh\e(B 6 \e$B9`$K5-=R$5$l$F$$$k$h$&$K!"J8=q$K7@Ls=q$NJ#<L$rIU2C$9$k$3$H\e(B
44 \e$B$K$h$C$F!"9T$J$&$3$H$,$G$-$^$9!#\e(B
45 @end quotation
46 @end copying
47
48 @dircategory Emacs
49 @direntry
50 * Auth-source-ja: (auth-ja).   The Emacs auth-source library (Japanese).
51 @end direntry
52
53 @titlepage
54 @title Emacs auth-source Library
55 @author by Ted Zlatanov
56 @page
57 @vskip 0pt plus 1filll
58 @insertcopying
59 @end titlepage
60
61 @contents
62
63 @ifnottex
64 @node Top
65 @top Emacs auth-source
66 \e$B$3$N%^%K%e%"%k$O\e(B Emacs auth-source \e$B%i%$%V%i%j!<$r@bL@$7$^$9!#\e(B
67
68 \e$BMxMQ<T$NJX59$N$?$a$K!"J#?t$N%"%W%j%1!<%7%g%s$G!"\e(B(Emacs \e$B$^$?$O%U%!%$%k$K\e(B
69 \e$B$"$k\e(B) \e$B0l$D$N@_Dj$r6&M-$9$k$?$a$N<jCJ$G$9!#\e(B
70
71 @insertcopying
72
73 @menu
74 * Overview::                    auth-source \e$B%i%$%V%i%j!<$N35MW\e(B
75 * Help for users::
76 * Help for developers::
77 * Index::
78 * Function Index::
79 * Variable Index::
80 @end menu
81 @end ifnottex
82
83 @node Overview
84 @chapter \e$B35MW\e(B
85
86 To be done.
87
88 @node Help for users
89 @chapter \e$BMxMQ<T$N$?$a$N%X%k%W\e(B
90
91 \e$B$b$7%]!<%H$GLdBj$,$"$k$N$J$i!"\e(B@code{gnus-verbose} \e$B$NCM$rBg$-$/$7$F!"$=$N\e(B
92 \e$B%i%$%V%i%j!<$,$I$N%]!<%H$r%A%'%C%/$7$F$$$k$+$r8+$F$/$@$5$$!#F1MM$KB>$N$I\e(B
93 \e$B$s$JLdBj$K$D$$$F$b!"2?$,%A%'%C%/$5$l$F$$$k$+$rD4$Y$k$N$,!"$"$J$?$NBh0lJb\e(B
94 \e$B$G$9!#\e(B
95
96 \e$B@_Dj\e(B:
97
98 @lisp
99 (require 'auth-source)
100 (customize-variable 'auth-sources) ;; \e$BG$0U!"0l2s$@$19T$J$C$F$/$@$5$$\e(B
101 @end lisp
102
103 @defvar auth-sources
104 @var{auth-sources} \e$BJQ?t$O!"8D!9$N%[%9%H$H%W%m%H%3%k$N$?$a$N\e(B netrc \e$B%U%!%$\e(B
105 \e$B%k$,$I$3$K:_$k$+$r\e(B auth-source \e$B%i%$%V%i%j!<$KCN$i$;$^$9!#9%$_$K1~$8$F$I\e(B
106 \e$B$&$K$G$b$G$-$^$9$,!"%G%#%U%)%k%H$N:G$b4J7i$J@_Dj$O<!$NDL$j$G$9\e(B:
107
108 @lisp
109 (setq auth-sources '((:source "~/.authinfo.gpg" :host t :protocol t)))
110 @end lisp
111
112 \e$B8D!9$N%[%9%H$^$?$O%W%m%H%3%k$N$?$a$NJ#?t$N9`L\$r$=$N%j%9%H$K2C$($k$3$H$K\e(B
113 \e$B$h$C$F!"$=$N%[%9%H$d%W%m%H%3%k$N$?$a$NFCDj$N\e(B netrc \e$B%U%!%$%k$r;}$D$3$H$,\e(B
114 \e$B$G$-$^$9!#\e(B
115 @end defvar
116
117 ``Netrc'' \e$B%U%!%$%k$O;v<B>e$NI8=`$G$9!#$=$l$i$O$3$N$h$&$K$J$C$F$$$^$9\e(B:
118 @example
119 machine mymachine login myloginname password mypassword port myport
120 @end example
121
122 \e$B%]!<%H$N;XDj$OL5$/$F$b9=$$$^$;$s!#L5$$>l9g!"\e(Bauth-source \e$B$O$I$s$J%]!<%H\e(B
123 \e$B$b\e(B OK \e$B$J$N$@$H2r<a$7$^$9!#<B:]$N$H$3$m!"%]!<%H$O%W%m%H%3%k$NL>A0$+%]!<%H\e(B
124 \e$BHV9f$N$I$A$i$G$bNI$$$N$G!"$b$7$=$&$7$?$$$N$J$i$P!"%]!<%H\e(B 143 \e$B$H%W%m%H%3\e(B
125 \e$B%k\e(B ``imap'' \e$B$N$?$a$N9`L\$rJL!9$K;}$D$3$H$,$G$-$^$9!#\e(B
126
127 \e$B$b$7\e(B @var{auth-sources} \e$B$r%+%9%?%^%$%:$7$J$$$H!"%G%#%U%)%k%H$G@83h$9$k$3\e(B
128 \e$B$H$K$J$k$G$7$g$&!#$=$N%G%#%U%)%k%H$H$O!"$I$s$J%[%9%H$b%]!<%H$K$D$$$F\e(B
129 \e$B$b\e(B netrc \e$B%U%!%$%k\e(B @code{~/.authinfo.gpg} \e$B$r;2>H$9$k$H$$$&$3$H$G$9!#$3$l\e(B
130 \e$B$O0E9f2=$5$l$?%U%!%$%k$G$9!#\e(BEPA \e$B$r;H$($k$h$&$K$7$F$$$k>l9g$K8B$j$^$9$,!"\e(B
131 \e$B$=$l$,6/$/?d>)$5$l$^$9!#\e(B
132
133 @lisp
134 (require 'epa-file)
135 (epa-file-enable)
136 (setq epa-file-cache-passphrase-for-symmetric-encryption t) ; \e$B$H$F$b=EMW\e(B
137 @end lisp
138
139 url-auth \e$BG'>Z\e(B (HTTP/HTTPS) \e$B$N$?$a$K$O!"$3$l$r\e(B netrc \e$B%U%!%$%k$KCV$$$F$*$/\e(B
140 \e$BI,MW$,$"$j$^$9\e(B:
141
142 @example
143 machine yourmachine.com:80 port http login testuser password testpass
144 @end example
145
146 \e$B$3$l$O$I$s$J3&LL$HG'>ZJ}<0\e(B (basic \e$B$^$?$O\e(B digest) \e$B$K$b9gCW$7$^$9!#$b$C$H\e(B
147 \e$B>\:Y$J@)8f$,I,MW$J>l9g$O!"\e(Burl-auth \e$B$N%=!<%9%3!<%I$HJQ?t$rD4$Y$F$/$@$5$$!#\e(B
148
149 Tramp \e$B$NG'>Z$K$O$3$l$r;H$C$F$/$@$5$$\e(B:
150
151 @example
152 machine yourmachine.com port scp login testuser password testpass
153 @end example
154
155 \e$B%]!<%H$O\e(B Tramp \e$B$N@\B3J}K!$r0UL#$9$k$3$H$KCm0U$7$F$/$@$5$$!#$b$7%]!<%H$N\e(B
156 \e$B9`$r;H$o$J$1$l$P!":G=i$NJ}$G@bL@$7$?$h$&$K!"$9$Y$F$N\e(B Tramp \e$B$NJ}<0$K9gCW\e(B
157 \e$B$7$^$9!#\e(B
158
159 @node Help for developers
160 @chapter \e$B3+H/<T$N$?$a$N%X%k%W\e(B
161
162 auth-source \e$B%i%$%V%i%j!<$K$O!"30It$G;H$&$?$a$N4X?t$O0l$D$7$+$"$j$^$;$s!#\e(B
163
164 @defun auth-source-user-or-password mode host port
165 \e$B%[%9%H\e(B @var{host} \e$B$*$h$S%]!<%H\e(B @var{port} \e$B$N$?$a$N\e(B @var{mode} \e$B$G7h$^$k!"\e(B
166 \e$BE,@Z$JG'>Z%H!<%/%s$r<h$j9~$_$^$9!#\e(B@code{gnus-verbose} \e$B$,\e(B 9 \e$B0J>e$G$"$l$P!"\e(B
167 \e$B%G%P%C%0$N$?$a$N%a%C%;!<%8$rI=<($7$^$9!#\e(B
168
169 \e$B$b$7\e(B @var{mode} \e$B$,J8;zNs$N%j%9%H$J$i$P!"4X?t$OJ8;zNs$N%j%9%H$^$?\e(B
170 \e$B$O\e(B @code{nil} \e$B$rJV$7$^$9!#$=$l$,$?$@$NJ8;zNs$J$i$P!"4X?t$O0l$D$NJ8;zNs\e(B
171 \e$B$+\e(B @code{nil} \e$B$rJV$7$^$9!#:#$N$H$3$m\e(B mode \e$B$H$7\e(B
172 \e$B$F\e(B ``login'' \e$B$H\e(B ``password'' \e$B$@$1$rG'<1$7$^$9$,!">-Mh$O$b$C$H2C$($i$l$k\e(B
173 \e$B$G$7$g$&!#\e(B
174
175 @var{host} \e$B$O%[%9%HL>$NJ8;zNs$G$9!#\e(B
176
177 @var{port} \e$B$O%W%m%H%3%kL>\e(B (\e$BNc$($P\e(B ``imap'') \e$B$^$?$O%]!<%HHV9f$G$9!#%f!<%6!<\e(B
178 \e$B$N\e(B netrc \e$B%U%!%$%k$K$"$k%]!<%H$KBP1~$9$kJ8;zNs$G$J$1$l$P$J$j$^$;$s!#\e(B
179
180 @example
181 ;; IMAP example
182 (setq auth (auth-source-user-or-password
183             '("login" "password")
184             "anyhostnamehere"
185             "imap"))
186 (nth 0 auth) ; \e$B%m%0%$%sL>\e(B
187 (nth 1 auth) ; \e$B%Q%9%o!<%I\e(B
188 @end example
189 @end defun
190
191 @node Index
192 @chapter Index
193 @printindex cp
194
195 @node Function Index
196 @chapter Function Index
197 @printindex fn
198
199 @node Variable Index
200 @chapter Variable Index
201 @printindex vr
202
203 @bye
204
205 @c Local Variables:
206 @c coding: iso-2022-7bit
207 @c fill-column: 72
208 @c mode: texinfo
209 @c use-kuten-for-period: t
210 @c use-touten-for-comma: t
211 @c End: