1 FETCH(3) NetBSD Library Functions Manual FETCH(3)
4 f
\bfe
\bet
\btc
\bch
\bhM
\bMa
\bak
\bke
\beU
\bUR
\bRL
\bL, f
\bfe
\bet
\btc
\bch
\bhP
\bPa
\bar
\brs
\bse
\beU
\bUR
\bRL
\bL, f
\bfe
\bet
\btc
\bch
\bhC
\bCo
\bop
\bpy
\byU
\bUR
\bRL
\bL, f
\bfe
\bet
\btc
\bch
\bhF
\bFr
\bre
\bee
\beU
\bUR
\bRL
\bL, f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btU
\bUR
\bRL
\bL,
5 f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btU
\bUR
\bRL
\bL, f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btU
\bUR
\bRL
\bL, f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\btU
\bUR
\bRL
\bL, f
\bfe
\bet
\btc
\bch
\bhL
\bLi
\bis
\bst
\btU
\bUR
\bRL
\bL, f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\bt,
6 f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\bt, f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\bt, f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\bt, f
\bfe
\bet
\btc
\bch
\bhL
\bLi
\bis
\bst
\bt, f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btF
\bFi
\bil
\ble
\be, f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btF
\bFi
\bil
\ble
\be,
7 f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btF
\bFi
\bil
\ble
\be, f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\btF
\bFi
\bil
\ble
\be, f
\bfe
\bet
\btc
\bch
\bhL
\bLi
\bis
\bst
\btF
\bFi
\bil
\ble
\be, f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btH
\bHT
\bTT
\bTP
\bP, f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btH
\bHT
\bTT
\bTP
\bP,
8 f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btH
\bHT
\bTT
\bTP
\bP, f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\btH
\bHT
\bTT
\bTP
\bP, f
\bfe
\bet
\btc
\bch
\bhL
\bLi
\bis
\bst
\btH
\bHT
\bTT
\bTP
\bP, f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btF
\bFT
\bTP
\bP, f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btF
\bFT
\bTP
\bP,
9 f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btF
\bFT
\bTP
\bP, f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\btF
\bFT
\bTP
\bP, f
\bfe
\bet
\btc
\bch
\bhL
\bLi
\bis
\bst
\btF
\bFT
\bTP
\bP f
\bfe
\bet
\btc
\bch
\bhI
\bIn
\bni
\bit
\btU
\bUR
\bRL
\bLL
\bLi
\bis
\bst
\bt,
10 f
\bfe
\bet
\btc
\bch
\bhF
\bFr
\bre
\bee
\beU
\bUR
\bRL
\bLL
\bLi
\bis
\bst
\bt, f
\bfe
\bet
\btc
\bch
\bhU
\bUn
\bnq
\bqu
\buo
\bot
\bte
\beP
\bPa
\bat
\bth
\bh, f
\bfe
\bet
\btc
\bch
\bhU
\bUn
\bnq
\bqu
\buo
\bot
\bte
\beF
\bFi
\bil
\ble
\ben
\bna
\bam
\bme
\be,
11 f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\btr
\bri
\bin
\bng
\bgi
\bif
\bfy
\byU
\bUR
\bRL
\bL, f
\bfe
\bet
\btc
\bch
\bh -- file transfer functions
13 L
\bLI
\bIB
\bBR
\bRA
\bAR
\bRY
\bY
14 File Transfer Library for URLs (libfetch, -lfetch)
16 S
\bSY
\bYN
\bNO
\bOP
\bPS
\bSI
\bIS
\bS
17 #
\b#i
\bin
\bnc
\bcl
\blu
\bud
\bde
\be <
\b<s
\bst
\btd
\bdi
\bio
\bo.
\b.h
\bh>
\b>
18 #
\b#i
\bin
\bnc
\bcl
\blu
\bud
\bde
\be <
\b<f
\bfe
\bet
\btc
\bch
\bh.
\b.h
\bh>
\b>
20 _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*
21 f
\bfe
\bet
\btc
\bch
\bhM
\bMa
\bak
\bke
\beU
\bUR
\bRL
\bL(_
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bs_
\bc_
\bh_
\be_
\bm_
\be, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bh_
\bo_
\bs_
\bt, _
\bi_
\bn_
\bt _
\bp_
\bo_
\br_
\bt,
22 _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bd_
\bo_
\bc, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bu_
\bs_
\be_
\br, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bp_
\bw_
\bd);
24 _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*
25 f
\bfe
\bet
\btc
\bch
\bhP
\bPa
\bar
\brs
\bse
\beU
\bUR
\bRL
\bL(_
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bU_
\bR_
\bL);
27 _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*
28 f
\bfe
\bet
\btc
\bch
\bhC
\bCo
\bop
\bpy
\byU
\bUR
\bRL
\bL(_
\bc_
\bo_
\bn_
\bs_
\bt _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu);
31 f
\bfe
\bet
\btc
\bch
\bhF
\bFr
\bre
\bee
\beU
\bUR
\bRL
\bL(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu);
33 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
34 f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btU
\bUR
\bRL
\bL(_
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bU_
\bR_
\bL, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bs_
\bt_
\ba_
\bt _
\b*_
\bu_
\bs, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
36 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
37 f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btU
\bUR
\bRL
\bL(_
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bU_
\bR_
\bL, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
39 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
40 f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btU
\bUR
\bRL
\bL(_
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bU_
\bR_
\bL, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
43 f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\btU
\bUR
\bRL
\bL(_
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bU_
\bR_
\bL, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bs_
\bt_
\ba_
\bt _
\b*_
\bu_
\bs, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
46 f
\bfe
\bet
\btc
\bch
\bhL
\bLi
\bis
\bst
\btU
\bUR
\bRL
\bL(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bl_
\bi_
\bs_
\bt _
\b*_
\bl_
\bi_
\bs_
\bt, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bU_
\bR_
\bL, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
48 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
49 f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\bt(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bs_
\bt_
\ba_
\bt _
\b*_
\bu_
\bs, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
51 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
52 f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\bt(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
54 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
55 f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\bt(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
58 f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\bt(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bs_
\bt_
\ba_
\bt _
\b*_
\bu_
\bs, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
61 f
\bfe
\bet
\btc
\bch
\bhL
\bLi
\bis
\bst
\bt(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bl_
\bi_
\bs_
\bt _
\b*_
\bl_
\bi_
\bs_
\bt, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
63 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
64 f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btF
\bFi
\bil
\ble
\be(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bs_
\bt_
\ba_
\bt _
\b*_
\bu_
\bs, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
66 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
67 f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btF
\bFi
\bil
\ble
\be(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
69 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
70 f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btF
\bFi
\bil
\ble
\be(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
73 f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\btF
\bFi
\bil
\ble
\be(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bs_
\bt_
\ba_
\bt _
\b*_
\bu_
\bs, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
76 f
\bfe
\bet
\btc
\bch
\bhL
\bLi
\bis
\bst
\btF
\bFi
\bil
\ble
\be(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bl_
\bi_
\bs_
\bt _
\b*_
\bl_
\bi_
\bs_
\bt, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
78 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
79 f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btH
\bHT
\bTT
\bTP
\bP(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bs_
\bt_
\ba_
\bt _
\b*_
\bu_
\bs, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
81 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
82 f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btH
\bHT
\bTT
\bTP
\bP(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
84 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
85 f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btH
\bHT
\bTT
\bTP
\bP(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
88 f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\btH
\bHT
\bTT
\bTP
\bP(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bs_
\bt_
\ba_
\bt _
\b*_
\bu_
\bs, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
91 f
\bfe
\bet
\btc
\bch
\bhL
\bLi
\bis
\bst
\btH
\bHT
\bTT
\bTP
\bP(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bl_
\bi_
\bs_
\bt _
\b*_
\bl_
\bi_
\bs_
\bt, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
93 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
94 f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btF
\bFT
\bTP
\bP(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bs_
\bt_
\ba_
\bt _
\b*_
\bu_
\bs, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
96 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
97 f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btF
\bFT
\bTP
\bP(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
99 _
\bf_
\be_
\bt_
\bc_
\bh_
\bI_
\bO _
\b*
100 f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btF
\bFT
\bTP
\bP(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
103 f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\btF
\bFT
\bTP
\bP(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bs_
\bt_
\ba_
\bt _
\b*_
\bu_
\bs, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
106 f
\bfe
\bet
\btc
\bch
\bhL
\bLi
\bis
\bst
\btF
\bFT
\bTP
\bP(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bl_
\bi_
\bs_
\bt _
\b*_
\bl_
\bi_
\bs_
\bt, _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bc_
\bh_
\ba_
\br _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs);
109 f
\bfe
\bet
\btc
\bch
\bhI
\bIn
\bni
\bit
\btU
\bUR
\bRL
\bLL
\bLi
\bis
\bst
\bt(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bl_
\bi_
\bs_
\bt _
\b*_
\bu_
\bl);
112 f
\bfe
\bet
\btc
\bch
\bhA
\bAp
\bpp
\bpe
\ben
\bnd
\bdU
\bUR
\bRL
\bLL
\bLi
\bis
\bst
\bt(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bl_
\bi_
\bs_
\bt _
\b*_
\bd_
\bs_
\bt, _
\bc_
\bo_
\bn_
\bs_
\bt _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bl_
\bi_
\bs_
\bt _
\b*_
\bs_
\br_
\bc);
115 f
\bfe
\bet
\btc
\bch
\bhF
\bFr
\bre
\bee
\beU
\bUR
\bRL
\bLL
\bLi
\bis
\bst
\bt(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl_
\b__
\bl_
\bi_
\bs_
\bt _
\b*_
\bu_
\bl);
117 _
\bc_
\bh_
\ba_
\br _
\b*
118 f
\bfe
\bet
\btc
\bch
\bhU
\bUn
\bnq
\bqu
\buo
\bot
\bte
\beP
\bPa
\bat
\bth
\bh(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu);
120 _
\bc_
\bh_
\ba_
\br _
\b*
121 f
\bfe
\bet
\btc
\bch
\bhU
\bUn
\bnq
\bqu
\buo
\bot
\bte
\beF
\bFi
\bil
\ble
\ben
\bna
\bam
\bme
\be(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu);
123 _
\bc_
\bh_
\ba_
\br _
\b*
124 f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\btr
\bri
\bin
\bng
\bgi
\bif
\bfy
\byU
\bUR
\bRL
\bL(_
\bc_
\bo_
\bn_
\bs_
\bt _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu);
126 D
\bDE
\bES
\bSC
\bCR
\bRI
\bIP
\bPT
\bTI
\bIO
\bON
\bN
127 These functions implement a high-level library for retrieving and upload-
128 ing files using Uniform Resource Locators (URLs).
130 f
\bfe
\bet
\btc
\bch
\bhP
\bPa
\bar
\brs
\bse
\beU
\bUR
\bRL
\bL() takes a URL in the form of a null-terminated string and
131 splits it into its components function according to the Common Internet
132 Scheme Syntax detailed in RFC 1738. A regular expression which produces
135 <scheme>:(//(<user>(:<pwd>)?@)?<host>(:<port>)?)?/(<document>)?
137 If the URL does not seem to begin with a scheme name, it is assumed to be
138 a local path. Only absolute path names are accepted.
140 Note that some components of the URL are not necessarily relevant to all
141 URL schemes. For instance, the file scheme only needs the <scheme> and
142 <document> components. f
\bfe
\bet
\btc
\bch
\bhP
\bPa
\bar
\brs
\bse
\beU
\bUR
\bRL
\bL() quotes any unsafe character in
143 the URL automatically. This is not done by f
\bfe
\bet
\btc
\bch
\bhM
\bMa
\bak
\bke
\beU
\bUR
\bRL
\bL().
144 f
\bfe
\bet
\btc
\bch
\bhC
\bCo
\bop
\bpy
\byU
\bUR
\bRL
\bL() copies an existing _
\bu_
\br_
\bl structure.
146 f
\bfe
\bet
\btc
\bch
\bhM
\bMa
\bak
\bke
\beU
\bUR
\bRL
\bL(), f
\bfe
\bet
\btc
\bch
\bhP
\bPa
\bar
\brs
\bse
\beU
\bUR
\bRL
\bL(), and f
\bfe
\bet
\btc
\bch
\bhC
\bCo
\bop
\bpy
\byU
\bUR
\bRL
\bL() return a pointer to a
147 _
\bu_
\br_
\bl structure, which is defined as follows in <_
\bf_
\be_
\bt_
\bc_
\bh_
\b._
\bh>:
149 #define URL_SCHEMELEN 16
150 #define URL_USERLEN 256
151 #define URL_PWDLEN 256
152 #define URL_HOSTLEN 255
155 char scheme[URL_SCHEMELEN + 1];
156 char user[URL_USERLEN + 1];
157 char pwd[URL_PWDLEN + 1];
158 char host[URL_HOSTLEN + 1];
163 time_t last_modified;
166 The pointer returned by f
\bfe
\bet
\btc
\bch
\bhM
\bMa
\bak
\bke
\beU
\bUR
\bRL
\bL(), f
\bfe
\bet
\btc
\bch
\bhC
\bCo
\bop
\bpy
\byU
\bUR
\bRL
\bL(), and
167 f
\bfe
\bet
\btc
\bch
\bhP
\bPa
\bar
\brs
\bse
\beU
\bUR
\bRL
\bL() should be freed using f
\bfe
\bet
\btc
\bch
\bhF
\bFr
\bre
\bee
\beU
\bUR
\bRL
\bL(). The size of _
\bs_
\bt_
\br_
\bu_
\bc_
\bt
168 _
\bU_
\bR_
\bL is not part of the ABI.
170 f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btU
\bUR
\bRL
\bL(), f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btU
\bUR
\bRL
\bL(), and f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btU
\bUR
\bRL
\bL() constitute the recom-
171 mended interface to the f
\bfe
\bet
\btc
\bch
\bh library. They examine the URL passed to
172 them to determine the transfer method, and call the appropriate lower-
173 level functions to perform the actual transfer. f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btU
\bUR
\bRL
\bL() also
174 returns the remote document's metadata in the _
\bu_
\br_
\bl_
\b__
\bs_
\bt_
\ba_
\bt structure pointed
175 to by the _
\bu_
\bs argument.
177 The _
\bf_
\bl_
\ba_
\bg_
\bs argument is a string of characters which specify transfer
178 options. The meaning of the individual flags is scheme-dependent, and is
179 detailed in the appropriate section below.
181 f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\btU
\bUR
\bRL
\bL() attempts to obtain the requested document's metadata and
182 fill in the structure pointed to by its second argument. The _
\bu_
\br_
\bl_
\b__
\bs_
\bt_
\ba_
\bt
183 structure is defined as follows in <_
\bf_
\be_
\bt_
\bc_
\bh_
\b._
\bh>:
191 If the size could not be obtained from the server, the _
\bs_
\bi_
\bz_
\be field is set
192 to -1. If the modification time could not be obtained from the server,
193 the _
\bm_
\bt_
\bi_
\bm_
\be field is set to the epoch. If the access time could not be
194 obtained from the server, the _
\ba_
\bt_
\bi_
\bm_
\be field is set to the modification
197 f
\bfe
\bet
\btc
\bch
\bhL
\bLi
\bis
\bst
\btU
\bUR
\bRL
\bL() attempts to list the contents of the directory pointed to
198 by the URL provided. The pattern can be a simple glob-like expression as
199 hint. Callers should not depend on the server to filter names. If suc-
200 cessful, it appends the list of entries to the _
\bu_
\br_
\bl_
\b__
\bl_
\bi_
\bs_
\bt structure. The
201 _
\bu_
\br_
\bl_
\b__
\bl_
\bi_
\bs_
\bt structure is defined as follows in <_
\bf_
\be_
\bt_
\bc_
\bh_
\b._
\bh>:
209 The list should be initialized by calling f
\bfe
\bet
\btc
\bch
\bhI
\bIn
\bni
\bit
\btU
\bUR
\bRL
\bLL
\bLi
\bis
\bst
\bt() and the
210 entries be freed by calling f
\bfe
\bet
\btc
\bch
\bhF
\bFr
\bre
\bee
\beU
\bUR
\bRL
\bLL
\bLi
\bis
\bst
\bt(). The functio
211 f
\bfe
\bet
\btc
\bch
\bhA
\bAp
\bpp
\bpe
\ben
\bnd
\bdU
\bUR
\bRL
\bLL
\bLi
\bis
\bst
\bt() can be used to append one URL lists to another. If
212 the `c' (cache result) flag is specified, the library is allowed to
213 internally cache the result.
215 f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\btr
\bri
\bin
\bng
\bgi
\bif
\bfy
\byU
\bUR
\bRL
\bL() returns the URL as string. f
\bfe
\bet
\btc
\bch
\bhU
\bUn
\bnq
\bqu
\buo
\bot
\bte
\beP
\bPa
\bat
\bth
\bh()
216 returns the path name part of the URL with any quoting undone. Query
217 arguments and fragment identifiers are not included.
218 f
\bfe
\bet
\btc
\bch
\bhU
\bUn
\bnq
\bqu
\buo
\bot
\bte
\beF
\bFi
\bil
\ble
\ben
\bna
\bam
\bme
\be() returns the last component of the path name as
219 returned by f
\bfe
\bet
\btc
\bch
\bhU
\bUn
\bnq
\bqu
\buo
\bot
\bte
\beP
\bPa
\bat
\bth
\bh(). f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\btr
\bri
\bin
\bng
\bgi
\bif
\bfy
\byU
\bUR
\bRL
\bL(), f
\bfe
\bet
\btc
\bch
\bhU
\bUn
\bnq
\bqu
\buo
\bot
\bte
\beP
\bPa
\bat
\bth
\bh(),
220 and f
\bfe
\bet
\btc
\bch
\bhU
\bUn
\bnq
\bqu
\buo
\bot
\bte
\beF
\bFi
\bil
\ble
\ben
\bna
\bam
\bme
\be() return a string that should be deallocated
221 with f
\bfr
\bre
\bee
\be() after use.
223 f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\bt(), f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\bt(), f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\bt(), and f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\bt() are similar to
224 f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btU
\bUR
\bRL
\bL(), f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btU
\bUR
\bRL
\bL(), f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btU
\bUR
\bRL
\bL(), and f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\btU
\bUR
\bRL
\bL(), except
225 that they expect a pre-parsed URL in the form of a pointer to a _
\bs_
\bt_
\br_
\bu_
\bc_
\bt
226 _
\bu_
\br_
\bl rather than a string.
228 All of the f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btX
\bXX
\bXX
\bX(), f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btX
\bXX
\bXX
\bX(), and f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btX
\bXX
\bXX
\bX() functions
229 return a pointer to a stream which can be used to read or write data from
230 or to the requested document, respectively. Note that although the
231 implementation details of the individual access methods vary, it can gen-
232 erally be assumed that a stream returned by one of the f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btX
\bXX
\bXX
\bX() or
233 f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btX
\bXX
\bXX
\bX() functions is read-only, and that a stream returned by one
234 of the f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btX
\bXX
\bXX
\bX() functions is write-only.
236 P
\bPR
\bRO
\bOT
\bTO
\bOC
\bCO
\bOL
\bL I
\bIN
\bND
\bDE
\bEP
\bPE
\bEN
\bND
\bDE
\bEN
\bNT
\bT F
\bFL
\bLA
\bAG
\bGS
\bS
237 If the `i' (if-modified-since) flag is specified, the library will try to
238 fetch the content only if it is newer than _
\bl_
\ba_
\bs_
\bt_
\b__
\bm_
\bo_
\bd_
\bi_
\bf_
\bi_
\be_
\bd. For HTTP an
239 If-Modified-Since HTTP header is sent. For FTP a MTDM command is sent
240 first and compared locally. For FILE the source file is compared.
242 F
\bFI
\bIL
\bLE
\bE S
\bSC
\bCH
\bHE
\bEM
\bME
\bE
243 f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btF
\bFi
\bil
\ble
\be(), f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btF
\bFi
\bil
\ble
\be(), and f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btF
\bFi
\bil
\ble
\be() provide access to
244 documents which are files in a locally mounted file system. Only the
245 <document> component of the URL is used.
247 f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btF
\bFi
\bil
\ble
\be() and f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btF
\bFi
\bil
\ble
\be() do not accept any flags.
249 f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btF
\bFi
\bil
\ble
\be() accepts the `a' (append to file) flag. If that flag is
250 specified, the data written to the stream returned by f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btF
\bFi
\bil
\ble
\be() will
251 be appended to the previous contents of the file, instead of replacing
254 F
\bFT
\bTP
\bP S
\bSC
\bCH
\bHE
\bEM
\bME
\bE
255 f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btF
\bFT
\bTP
\bP(), f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btF
\bFT
\bTP
\bP(), and f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btF
\bFT
\bTP
\bP() implement the FTP proto-
256 col as described in RFC 959.
258 By default l
\bli
\bib
\bbf
\bfe
\bet
\btc
\bch
\bh will attempt to use passive mode first and only fall-
259 back to active mode if the server reports a syntax error. If the `a'
260 (active) flag is specified, a passive connection is not tried and active
261 mode is used directly.
263 If the `l' (low) flag is specified, data sockets will be allocated in the
264 low (or default) port range instead of the high port range (see ip(4)).
266 If the `d' (direct) flag is specified, f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btF
\bFT
\bTP
\bP(), f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btF
\bFT
\bTP
\bP(), and
267 f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btF
\bFT
\bTP
\bP() will use a direct connection even if a proxy server is
270 If no user name or password is given, the f
\bfe
\bet
\btc
\bch
\bh library will attempt an
271 anonymous login, with user name "anonymous" and password "anony-
274 H
\bHT
\bTT
\bTP
\bP S
\bSC
\bCH
\bHE
\bEM
\bME
\bE
275 The f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btH
\bHT
\bTT
\bTP
\bP(), f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btH
\bHT
\bTT
\bTP
\bP(), and f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btH
\bHT
\bTT
\bTP
\bP() functions imple-
276 ment the HTTP/1.1 protocol. With a little luck, there is even a chance
277 that they comply with RFC 2616 and RFC 2617.
279 If the `d' (direct) flag is specified, f
\bfe
\bet
\btc
\bch
\bhX
\bXG
\bGe
\bet
\btH
\bHT
\bTT
\bTP
\bP(), f
\bfe
\bet
\btc
\bch
\bhG
\bGe
\bet
\btH
\bHT
\bTT
\bTP
\bP(),
280 and f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btH
\bHT
\bTT
\bTP
\bP() will use a direct connection even if a proxy server is
283 Since there seems to be no good way of implementing the HTTP PUT method
284 in a manner consistent with the rest of the f
\bfe
\bet
\btc
\bch
\bh library, f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btH
\bHT
\bTT
\bTP
\bP()
285 is currently unimplemented.
287 A
\bAU
\bUT
\bTH
\bHE
\bEN
\bNT
\bTI
\bIC
\bCA
\bAT
\bTI
\bIO
\bON
\bN
288 Apart from setting the appropriate environment variables and specifying
289 the user name and password in the URL or the _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl, the calling pro-
290 gram has the option of defining an authentication function with the fol-
293 _
\bi_
\bn_
\bt m
\bmy
\byA
\bAu
\but
\bth
\bhM
\bMe
\bet
\bth
\bho
\bod
\bd(_
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl _
\b*_
\bu)
295 The callback function should fill in the _
\bu_
\bs_
\be_
\br and _
\bp_
\bw_
\bd fields in the pro-
296 vided _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl and return 0 on success, or any other value to indicate
299 To register the authentication callback, simply set _
\bf_
\be_
\bt_
\bc_
\bh_
\bA_
\bu_
\bt_
\bh_
\bM_
\be_
\bt_
\bh_
\bo_
\bd to
300 point at it. The callback will be used whenever a site requires authen-
301 tication and the appropriate environment variables are not set.
303 This interface is experimental and may be subject to change.
305 R
\bRE
\bET
\bTU
\bUR
\bRN
\bN V
\bVA
\bAL
\bLU
\bUE
\bES
\bS
306 f
\bfe
\bet
\btc
\bch
\bhP
\bPa
\bar
\brs
\bse
\beU
\bUR
\bRL
\bL() returns a pointer to a _
\bs_
\bt_
\br_
\bu_
\bc_
\bt _
\bu_
\br_
\bl containing the individ-
307 ual components of the URL. If it is unable to allocate memory, or the
308 URL is syntactically incorrect, f
\bfe
\bet
\btc
\bch
\bhP
\bPa
\bar
\brs
\bse
\beU
\bUR
\bRL
\bL() returns a NULL pointer.
310 The f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\bt() functions return 0 on success and -1 on failure.
312 All other functions return a stream pointer which may be used to access
313 the requested document, or NULL if an error occurred.
315 The following error codes are defined in <_
\bf_
\be_
\bt_
\bc_
\bh_
\b._
\bh>:
317 [FETCH_ABORT] Operation aborted
319 [FETCH_AUTH] Authentication failed
321 [FETCH_DOWN] Service unavailable
323 [FETCH_EXISTS] File exists
325 [FETCH_FULL] File system full
327 [FETCH_INFO] Informational response
329 [FETCH_MEMORY] Insufficient memory
331 [FETCH_MOVED] File has moved
333 [FETCH_NETWORK] Network error
337 [FETCH_PROTO] Protocol error
339 [FETCH_RESOLV] Resolver error
341 [FETCH_SERVER] Server error
343 [FETCH_TEMP] Temporary error
345 [FETCH_TIMEOUT] Operation timed out
347 [FETCH_UNAVAIL] File is not available
349 [FETCH_UNKNOWN] Unknown error
351 [FETCH_URL] Invalid URL
353 The accompanying error message includes a protocol-specific error code
354 and message, e.g. "File is not available (404 Not Found)"
356 E
\bEN
\bNV
\bVI
\bIR
\bRO
\bON
\bNM
\bME
\bEN
\bNT
\bT
357 FETCH_BIND_ADDRESS Specifies a host name or IP address to which sockets
358 used for outgoing connections will be bound.
360 FTP_LOGIN Default FTP login if none was provided in the URL.
362 FTP_PASSIVE_MODE If set to anything but `no', forces the FTP code to
365 FTP_PASSWORD Default FTP password if the remote server requests
366 one and none was provided in the URL.
368 FTP_PROXY URL of the proxy to use for FTP requests. The docu-
369 ment part is ignored. FTP and HTTP proxies are sup-
370 ported; if no scheme is specified, FTP is assumed.
371 If the proxy is an FTP proxy, l
\bli
\bib
\bbf
\bfe
\bet
\btc
\bch
\bh will send
372 `user@host' as user name to the proxy, where `user'
373 is the real user name, and `host' is the name of the
376 If this variable is set to an empty string, no proxy
377 will be used for FTP requests, even if the HTTP_PROXY
380 ftp_proxy Same as FTP_PROXY, for compatibility.
382 HTTP_AUTH Specifies HTTP authorization parameters as a colon-
383 separated list of items. The first and second item
384 are the authorization scheme and realm respectively;
385 further items are scheme-dependent. Currently, only
386 basic authorization is supported.
388 Basic authorization requires two parameters: the user
389 name and password, in that order.
391 This variable is only used if the server requires
392 authorization and no user name or password was speci-
395 HTTP_PROXY URL of the proxy to use for HTTP requests. The docu-
396 ment part is ignored. Only HTTP proxies are sup-
397 ported for HTTP requests. If no port number is spec-
398 ified, the default is 3128.
400 Note that this proxy will also be used for FTP docu-
401 ments, unless the FTP_PROXY variable is set.
403 http_proxy Same as HTTP_PROXY, for compatibility.
405 HTTP_PROXY_AUTH Specifies authorization parameters for the HTTP proxy
406 in the same format as the HTTP_AUTH variable.
408 This variable is used if and only if connected to an
409 HTTP proxy, and is ignored if a user and/or a pass-
410 word were specified in the proxy URL.
412 HTTP_REFERER Specifies the referrer URL to use for HTTP requests.
413 If set to ``auto'', the document URL will be used as
416 HTTP_USER_AGENT Specifies the User-Agent string to use for HTTP
417 requests. This can be useful when working with HTTP
418 origin or proxy servers that differentiate between
421 NETRC Specifies a file to use instead of _
\b~_
\b/_
\b._
\bn_
\be_
\bt_
\br_
\bc to look
422 up login names and passwords for FTP sites. See
423 ftp(1) for a description of the file format. This
424 feature is experimental.
426 NO_PROXY Either a single asterisk, which disables the use of
427 proxies altogether, or a comma- or whitespace-sepa-
428 rated list of hosts for which proxies should not be
431 no_proxy Same as NO_PROXY, for compatibility.
433 E
\bEX
\bXA
\bAM
\bMP
\bPL
\bLE
\bES
\bS
434 To access a proxy server on _
\bp_
\br_
\bo_
\bx_
\by_
\b._
\be_
\bx_
\ba_
\bm_
\bp_
\bl_
\be_
\b._
\bc_
\bo_
\bm port 8080, set the
435 HTTP_PROXY environment variable in a manner similar to this:
437 HTTP_PROXY=http://proxy.example.com:8080
439 If the proxy server requires authentication, there are two options avail-
440 able for passing the authentication data. The first method is by using
443 HTTP_PROXY=http://<user>:<pwd>@proxy.example.com:8080
445 The second method is by using the HTTP_PROXY_AUTH environment variable:
447 HTTP_PROXY=http://proxy.example.com:8080
448 HTTP_PROXY_AUTH=basic:*:<user>:<pwd>
450 To disable the use of a proxy for an HTTP server running on the local
451 host, define NO_PROXY as follows:
453 NO_PROXY=localhost,127.0.0.1
455 S
\bSE
\bEE
\bE A
\bAL
\bLS
\bSO
\bO
458 J. Postel and J. K. Reynolds, _
\bF_
\bi_
\bl_
\be _
\bT_
\br_
\ba_
\bn_
\bs_
\bf_
\be_
\br _
\bP_
\br_
\bo_
\bt_
\bo_
\bc_
\bo_
\bl, October 1985, RFC
461 P. Deutsch, A. Emtage, and A. Marine, _
\bH_
\bo_
\bw _
\bt_
\bo _
\bU_
\bs_
\be _
\bA_
\bn_
\bo_
\bn_
\by_
\bm_
\bo_
\bu_
\bs _
\bF_
\bT_
\bP, May 1994,
464 T. Berners-Lee, L. Masinter, and M. McCahill, _
\bU_
\bn_
\bi_
\bf_
\bo_
\br_
\bm _
\bR_
\be_
\bs_
\bo_
\bu_
\br_
\bc_
\be _
\bL_
\bo_
\bc_
\ba_
\bt_
\bo_
\br_
\bs
465 _
\b(_
\bU_
\bR_
\bL_
\b), December 1994, RFC 1738.
467 R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and
468 T. Berners-Lee, _
\bH_
\by_
\bp_
\be_
\br_
\bt_
\be_
\bx_
\bt _
\bT_
\br_
\ba_
\bn_
\bs_
\bf_
\be_
\br _
\bP_
\br_
\bo_
\bt_
\bo_
\bc_
\bo_
\bl _
\b-_
\b- _
\bH_
\bT_
\bT_
\bP_
\b/_
\b1_
\b._
\b1, January 1999,
471 J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A.
472 Luotonen, and L. Stewart, _
\bH_
\bT_
\bT_
\bP _
\bA_
\bu_
\bt_
\bh_
\be_
\bn_
\bt_
\bi_
\bc_
\ba_
\bt_
\bi_
\bo_
\bn_
\b: _
\bB_
\ba_
\bs_
\bi_
\bc _
\ba_
\bn_
\bd _
\bD_
\bi_
\bg_
\be_
\bs_
\bt _
\bA_
\bc_
\bc_
\be_
\bs_
\bs
473 _
\bA_
\bu_
\bt_
\bh_
\be_
\bn_
\bt_
\bi_
\bc_
\ba_
\bt_
\bi_
\bo_
\bn, June 1999, RFC 2617.
475 H
\bHI
\bIS
\bST
\bTO
\bOR
\bRY
\bY
476 The f
\bfe
\bet
\btc
\bch
\bh library first appeared in FreeBSD 3.0.
478 A
\bAU
\bUT
\bTH
\bHO
\bOR
\bRS
\bS
479 The f
\bfe
\bet
\btc
\bch
\bh library was mostly written by Dag-Erling Smørgrav
480 <des@FreeBSD.org> with numerous suggestions from Jordan K. Hubbard
481 <jkh@FreeBSD.org>, Eugene Skepner <eu@qub.com> and other FreeBSD develop-
482 ers. It replaces the older f
\bft
\btp
\bpi
\bio
\bo library written by Poul-Henning Kamp
483 <phk@FreeBSD.org> and Jordan K. Hubbard <jkh@FreeBSD.org>.
485 This manual page was written by Dag-Erling Smørgrav <des@FreeBSD.org>.
488 Some parts of the library are not yet implemented. The most notable
489 examples of this are f
\bfe
\bet
\btc
\bch
\bhP
\bPu
\but
\btH
\bHT
\bTT
\bTP
\bP() and FTP proxy support.
491 There is no way to select a proxy at run-time other than setting the
492 HTTP_PROXY or FTP_PROXY environment variables as appropriate.
494 l
\bli
\bib
\bbf
\bfe
\bet
\btc
\bch
\bh does not understand or obey 305 (Use Proxy) replies.
496 Error numbers are unique only within a certain context; the error codes
497 used for FTP and HTTP overlap, as do those used for resolver and system
498 errors. For instance, error code 202 means "Command not implemented,
499 superfluous at this site" in an FTP context and "Accepted" in an HTTP
502 f
\bfe
\bet
\btc
\bch
\bhS
\bSt
\bta
\bat
\btF
\bFT
\bTP
\bP() does not check that the result of an MDTM command is a
505 The man page is incomplete, poorly written and produces badly formatted
508 The error reporting mechanism is unsatisfactory.
510 Some parts of the code are not fully reentrant.
512 NetBSD 5.0 February 4, 2009 NetBSD 5.0