Fix direntry.
[elisp/gnus-doc-ja.git] / auth-ja.texi
1 \input texinfo                  @c -*-texinfo-*-
2
3 @setfilename auth-ja
4
5 @set VERSION 0.1
6
7 @dircategory Emacs
8 @direntry
9 * auth-source-ja: (auth-ja).   The Emacs auth-source library (Japanese).
10 @end direntry
11
12 @settitle Emacs auth-source Library @value{VERSION}
13
14 @copying
15 \e$B$3$N%U%!%$%k$O\e(B Emacs auth-source \e$B%i%$%V%i%j!<$r@bL@$7$^$9!#\e(B
16
17 Copyright @copyright{} 2008, 2009
18 Free Software Foundation, Inc.
19
20 @quotation
21 Permission is granted to copy, distribute and/or modify this document
22 under the terms of the GNU Free Documentation License, Version 1.3 or
23 any later version published by the Free Software Foundation; with no
24 Invariant Sections, with the Front-Cover texts being ``A GNU Manual,''
25 and with the Back-Cover Texts as in (a) below.  A copy of the license
26 is included in the section entitled ``GNU Free Documentation License''
27 in the Emacs manual.
28
29 \e$B$3$NJ8=q$r!"%U%j!<%=%U%H%&%'%":bCDH/9T$N\e(B GNU \e$B%U%j!<J8=qMxMQ5vBz7@Ls=q\e(B
30 \e$BBh\e(B 1.3 \e$BHG$^$?$O$=$l0J9_$NHG$,Dj$a$k>r7o$N2<$GJ#@=!"G[I[!"$"$k$$$OJQ99$9\e(B
31 \e$B$k$3$H$r5v2D$7$^$9!#JQ99IT2DItJ,$O;XDj$7$^$;$s!#!H\e(BA GNU Manual\e$B!I$OI=I=;f\e(B
32 \e$B%F%-%9%H!"0J2<$N\e(B (a) \e$B$ON"I=;f%F%-%9%H$G$9!#$3$NMxMQ5vBz7@Ls=q$NJ#<L\e(B
33 \e$B$O\e(B Emacs \e$B%^%K%e%"%k$N!V\e(BGNU \e$B%U%j!<J8=qMxMQ5vBz7@Ls=q!W$H$$$&>O$K4^$^$l$F\e(B
34 \e$B$$$^$9!#\e(B
35
36 (a) The FSF's Back-Cover Text is: ``You have the freedom to copy and
37 modify this GNU manual.  Buying copies from the FSF supports it in
38 developing GNU and promoting software freedom.''
39
40 (a) FSF \e$B$NN"I=;f%F%-%9%H\e(B:\e$B!V$"$J$?$K$O$3$N\e(B GNU Manual \e$B$rJ#@=$7$?$jJQ99$9\e(B
41 \e$B$k<+M3$,$"$j$^$9!#\e(BFSF \e$B$+$i$NJ#<L$N9XF~$O\e(B GNU \e$B$N3+H/$H%=%U%H%&%'%"$N<+M3\e(B
42 \e$B$NB%?J$r;Y1g$7$^$9!#!W\e(B
43
44 This document is part of a collection distributed under the GNU Free
45 Documentation License.  If you want to distribute this document
46 separately from the collection, you can do so by adding a copy of the
47 license to the document, as described in section 6 of the license.
48
49 \e$B$3$NJ8=q$O!V\e(BGNU \e$B%U%j!<J8=qMxMQ5vBz7@Ls=q!W$K4p$E$$$FG[I[$5$l$?<}=8Cx:nJ*\e(B
50 \e$B$N0lIt$G$9!#$b$7$"$J$?$,$3$NJ8=q$r<}=8Cx:nJ*$+$iJ,N%$7$FG[I[$7$?$$$H$-$O!"\e(B
51 \e$B7@Ls=q$NBh\e(B 6 \e$B9`$K5-=R$5$l$F$$$k$h$&$K!"J8=q$K7@Ls=q$NJ#<L$rIU2C$9$k$3$H\e(B
52 \e$B$K$h$C$F!"9T$J$&$3$H$,$G$-$^$9!#\e(B
53 @end quotation
54 @end copying
55
56 @tex
57
58 @titlepage
59 @title Emacs auth-source Library
60
61 @author by Ted Zlatanov
62 @page
63
64 @vskip 0pt plus 1filll
65 @insertcopying
66 @end titlepage
67 @page
68
69 @end tex
70
71 @node Top
72 @top Emacs auth-source
73 \e$B$3$N%^%K%e%"%k$O\e(B Emacs auth-source \e$B%i%$%V%i%j!<$r@bL@$7$^$9!#\e(B
74
75 \e$BMxMQ<T$NJX59$N$?$a$K!"J#?t$N%"%W%j%1!<%7%g%s$G!"\e(B(Emacs \e$B$^$?$O%U%!%$%k$K\e(B
76 \e$B$"$k\e(B) \e$B0l$D$N@_Dj$r6&M-$9$k$?$a$N<jCJ$G$9!#\e(B
77
78 @menu
79 * Overview::                    auth-source \e$B%i%$%V%i%j!<$N35MW\e(B
80 * Help for users::
81 * Help for developers::
82 * Index::
83 * Function Index::
84 * Variable Index::
85 @end menu
86
87 @node Overview
88 @chapter \e$B35MW\e(B
89
90 To be done.
91
92 @node Help for users
93 @chapter \e$BMxMQ<T$N$?$a$N%X%k%W\e(B
94
95 \e$B$b$7%]!<%H$GLdBj$,$"$k$N$J$i!"\e(B@code{gnus-verbose} \e$B$NCM$rBg$-$/$7$F!"$=$N\e(B
96 \e$B%i%$%V%i%j!<$,$I$N%]!<%H$r%A%'%C%/$7$F$$$k$+$r8+$F$/$@$5$$!#F1MM$KB>$N$I\e(B
97 \e$B$s$JLdBj$K$D$$$F$b!"2?$,%A%'%C%/$5$l$F$$$k$+$rD4$Y$k$N$,!"$"$J$?$NBh0lJb\e(B
98 \e$B$G$9!#\e(B
99
100 \e$B@_Dj\e(B:
101
102 @lisp
103 (require 'auth-source)
104 (customize-variable 'auth-sources) ;; \e$BG$0U!"0l2s$@$19T$J$C$F$/$@$5$$\e(B
105 @end lisp
106
107 @defvar auth-sources
108 @var{auth-sources} \e$BJQ?t$O!"8D!9$N%[%9%H$H%W%m%H%3%k$N$?$a$N\e(B netrc \e$B%U%!%$\e(B
109 \e$B%k$,$I$3$K:_$k$+$r\e(B auth-source \e$B%i%$%V%i%j!<$KCN$i$;$^$9!#9%$_$K1~$8$F$I\e(B
110 \e$B$&$K$G$b$G$-$^$9$,!"%G%#%U%)%k%H$N:G$b4J7i$J@_Dj$O<!$NDL$j$G$9\e(B:
111
112 @lisp
113 (setq auth-sources '((:source "~/.authinfo.gpg" :host t :protocol t)))
114 @end lisp
115
116 \e$B8D!9$N%[%9%H$^$?$O%W%m%H%3%k$N$?$a$NJ#?t$N9`L\$r$=$N%j%9%H$K2C$($k$3$H$K\e(B
117 \e$B$h$C$F!"$=$N%[%9%H$d%W%m%H%3%k$N$?$a$NFCDj$N\e(B netrc \e$B%U%!%$%k$r;}$D$3$H$,\e(B
118 \e$B$G$-$^$9!#\e(B
119 @end defvar
120
121 ``Netrc'' \e$B%U%!%$%k$O;v<B>e$NI8=`$G$9!#$=$l$i$O$3$N$h$&$K$J$C$F$$$^$9\e(B:
122 @example
123 machine mymachine login myloginname password mypassword port myport
124 @end example
125
126 \e$B%]!<%H$N;XDj$OL5$/$F$b9=$$$^$;$s!#L5$$>l9g!"\e(Bauth-source \e$B$O$I$s$J%]!<%H\e(B
127 \e$B$b\e(B OK \e$B$J$N$@$H2r<a$7$^$9!#<B:]$N$H$3$m!"%]!<%H$O%W%m%H%3%k$NL>A0$+%]!<%H\e(B
128 \e$BHV9f$N$I$A$i$G$bNI$$$N$G!"$b$7$=$&$7$?$$$N$J$i$P!"%]!<%H\e(B 143 \e$B$H%W%m%H%3\e(B
129 \e$B%k\e(B ``imap'' \e$B$N$?$a$N9`L\$rJL!9$K;}$D$3$H$,$G$-$^$9!#\e(B
130
131 \e$B$b$7\e(B @var{auth-sources} \e$B$r%+%9%?%^%$%:$7$J$$$H!"%G%#%U%)%k%H$G@83h$9$k$3\e(B
132 \e$B$H$K$J$k$G$7$g$&!#$=$N%G%#%U%)%k%H$H$O!"$I$s$J%[%9%H$b%]!<%H$K$D$$$F\e(B
133 \e$B$b\e(B netrc \e$B%U%!%$%k\e(B @code{~/.authinfo.gpg} \e$B$r;2>H$9$k$H$$$&$3$H$G$9!#$3$l\e(B
134 \e$B$O0E9f2=$5$l$?%U%!%$%k$G$9!#\e(BEPA \e$B$r;H$($k$h$&$K$7$F$$$k>l9g$K8B$j$^$9$,!"\e(B
135 \e$B$=$l$,6/$/?d>)$5$l$^$9!#\e(B
136
137 @lisp
138 (require 'epa-file)
139 (epa-file-enable)
140 (setq epa-file-cache-passphrase-for-symmetric-encryption t) ; \e$B$H$F$b=EMW\e(B
141 @end lisp
142
143 url-auth \e$BG'>Z\e(B (HTTP/HTTPS) \e$B$N$?$a$K$O!"$3$l$r\e(B netrc \e$B%U%!%$%k$KCV$$$F$*$/\e(B
144 \e$BI,MW$,$"$j$^$9\e(B:
145
146 @example
147 machine yourmachine.com:80 port http login testuser password testpass
148 @end example
149
150 \e$B$3$l$O$I$s$J3&LL$HG'>ZJ}<0\e(B (basic \e$B$^$?$O\e(B digest) \e$B$K$b9gCW$7$^$9!#$b$C$H\e(B
151 \e$B>\:Y$J@)8f$,I,MW$J>l9g$O!"\e(Burl-auth \e$B$N%=!<%9%3!<%I$HJQ?t$rD4$Y$F$/$@$5$$!#\e(B
152
153 Tramp \e$B$NG'>Z$K$O$3$l$r;H$C$F$/$@$5$$\e(B:
154
155 @example
156 machine yourmachine.com port scp login testuser password testpass
157 @end example
158
159 \e$B%]!<%H$O\e(B Tramp \e$B$N@\B3J}K!$r0UL#$9$k$3$H$KCm0U$7$F$/$@$5$$!#$b$7%]!<%H$N\e(B
160 \e$B9`$r;H$o$J$1$l$P!":G=i$NJ}$G@bL@$7$?$h$&$K!"$9$Y$F$N\e(B Tramp \e$B$NJ}<0$K9gCW\e(B
161 \e$B$7$^$9!#\e(B
162
163 @node Help for developers
164 @chapter \e$B3+H/<T$N$?$a$N%X%k%W\e(B
165
166 auth-source \e$B%i%$%V%i%j!<$K$O!"30It$G;H$&$?$a$N4X?t$O0l$D$7$+$"$j$^$;$s!#\e(B
167
168 @defun auth-source-user-or-password mode host port
169 \e$B%[%9%H\e(B @var{host} \e$B$*$h$S%]!<%H\e(B @var{port} \e$B$N$?$a$N\e(B @var{mode} \e$B$G7h$^$k!"\e(B
170 \e$BE,@Z$JG'>Z%H!<%/%s$r<h$j9~$_$^$9!#\e(B@code{gnus-verbose} \e$B$,\e(B 9 \e$B0J>e$G$"$l$P!"\e(B
171 \e$B%G%P%C%0$N$?$a$N%a%C%;!<%8$rI=<($7$^$9!#\e(B
172
173 \e$B$b$7\e(B @var{mode} \e$B$,J8;zNs$N%j%9%H$J$i$P!"4X?t$OJ8;zNs$N%j%9%H$^$?\e(B
174 \e$B$O\e(B @code{nil} \e$B$rJV$7$^$9!#$=$l$,$?$@$NJ8;zNs$J$i$P!"4X?t$O0l$D$NJ8;zNs\e(B
175 \e$B$+\e(B @code{nil} \e$B$rJV$7$^$9!#:#$N$H$3$m\e(B mode \e$B$H$7\e(B
176 \e$B$F\e(B ``login'' \e$B$H\e(B ``password'' \e$B$@$1$rG'<1$7$^$9$,!">-Mh$O$b$C$H2C$($i$l$k\e(B
177 \e$B$G$7$g$&!#\e(B
178
179 @var{host} \e$B$O%[%9%HL>$NJ8;zNs$G$9!#\e(B
180
181 @var{port} \e$B$O%W%m%H%3%kL>\e(B (\e$BNc$($P\e(B ``imap'') \e$B$^$?$O%]!<%HHV9f$G$9!#%f!<%6!<\e(B
182 \e$B$N\e(B netrc \e$B%U%!%$%k$K$"$k%]!<%H$KBP1~$9$kJ8;zNs$G$J$1$l$P$J$j$^$;$s!#\e(B
183
184 @example
185 ;; IMAP example
186 (setq auth (auth-source-user-or-password
187             '("login" "password")
188             "anyhostnamehere"
189             "imap"))
190 (nth 0 auth) ; \e$B%m%0%$%sL>\e(B
191 (nth 1 auth) ; \e$B%Q%9%o!<%I\e(B
192 @end example
193 @end defun
194
195 @node Index
196 @chapter Index
197 @printindex cp
198
199 @node Function Index
200 @chapter Function Index
201 @printindex fn
202
203 @node Variable Index
204 @chapter Variable Index
205 @printindex vr
206
207 @summarycontents
208 @contents
209 @bye
210
211 @c Local Variables:
212 @c coding: iso-2022-7bit
213 @c fill-column: 72
214 @c mode: texinfo
215 @c use-kuten-for-period: t
216 @c use-touten-for-comma: t
217 @c End: