1 /* vi: set sw=4 ts=4: */
3 * wget - retrieve a file using HTTP or FTP
5 * Chip Rosenthal Covad Communications <chip@laserlink.net>
6 * Licensed under GPLv2, see file LICENSE in this source tree.
8 * Copyright (C) 2010 Bradley M. Kuhn <bkuhn@ebb.org>
9 * Kuhn's copyrights are licensed GPLv2-or-later. File as a whole remains GPLv2.
13 //#define log_io(...) bb_error_msg(__VA_ARGS__)
14 #define log_io(...) ((void)0)
29 off_t content_len; /* Content-length of the file */
30 off_t beg_range; /* Range at which continue begins */
31 #if ENABLE_FEATURE_WGET_STATUSBAR
32 off_t transferred; /* Number of bytes transferred so far */
33 const char *curfile; /* Name of current file being transferred */
37 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
41 char *fname_out; /* where to direct output (-O) */
42 const char *proxy_flag; /* Use proxies if env vars are set */
43 const char *user_agent; /* "User-Agent" header field */
44 #if ENABLE_FEATURE_WGET_TIMEOUT
45 unsigned timeout_seconds;
47 smallint chunked; /* chunked transfer encoding */
48 smallint got_clen; /* got content-length: from server */
49 /* Local downloads do benefit from big buffer.
50 * With 512 byte buffer, it was measured to be
51 * an order of magnitude slower than with big one.
53 uint64_t just_to_align_next_member;
54 char wget_buf[CONFIG_FEATURE_COPYBUF_KB*1024];
56 #define G (*ptr_to_globals)
57 #define INIT_G() do { \
58 SET_PTR_TO_GLOBALS(xzalloc(sizeof(G))); \
59 IF_FEATURE_WGET_TIMEOUT(G.timeout_seconds = 900;) \
63 /* Must match option string! */
65 WGET_OPT_CONTINUE = (1 << 0),
66 WGET_OPT_SPIDER = (1 << 1),
67 WGET_OPT_QUIET = (1 << 2),
68 WGET_OPT_OUTNAME = (1 << 3),
69 WGET_OPT_PREFIX = (1 << 4),
70 WGET_OPT_PROXY = (1 << 5),
71 WGET_OPT_USER_AGENT = (1 << 6),
72 WGET_OPT_NETWORK_READ_TIMEOUT = (1 << 7),
73 WGET_OPT_RETRIES = (1 << 8),
74 WGET_OPT_PASSIVE = (1 << 9),
75 WGET_OPT_HEADER = (1 << 10) * ENABLE_FEATURE_WGET_LONG_OPTIONS,
76 WGET_OPT_POST_DATA = (1 << 11) * ENABLE_FEATURE_WGET_LONG_OPTIONS,
84 #if ENABLE_FEATURE_WGET_STATUSBAR
85 static void progress_meter(int flag)
87 if (option_mask32 & WGET_OPT_QUIET)
90 if (flag == PROGRESS_START)
91 bb_progress_init(&G.pmt, G.curfile);
93 bb_progress_update(&G.pmt, G.beg_range, G.transferred,
94 G.chunked ? 0 : G.beg_range + G.transferred + G.content_len);
96 if (flag == PROGRESS_END) {
97 bb_progress_free(&G.pmt);
98 bb_putchar_stderr('\n');
103 static ALWAYS_INLINE void progress_meter(int flag UNUSED_PARAM) { }
107 /* IPv6 knows scoped address types i.e. link and site local addresses. Link
108 * local addresses can have a scope identifier to specify the
109 * interface/link an address is valid on (e.g. fe80::1%eth0). This scope
110 * identifier is only valid on a single node.
112 * RFC 4007 says that the scope identifier MUST NOT be sent across the wire,
113 * unless all nodes agree on the semantic. Apache e.g. regards zone identifiers
114 * in the Host header as invalid requests, see
115 * https://issues.apache.org/bugzilla/show_bug.cgi?id=35122
117 static void strip_ipv6_scope_id(char *host)
121 /* bbox wget actually handles IPv6 addresses without [], like
122 * wget "http://::1/xxx", but this is not standard.
123 * To save code, _here_ we do not support it. */
126 return; /* not IPv6 */
128 scope = strchr(host, '%');
132 /* Remove the IPv6 zone identifier from the host address */
133 cp = strchr(host, ']');
134 if (!cp || (cp[1] != ':' && cp[1] != '\0')) {
135 /* malformed address (not "[xx]:nn" or "[xx]") */
139 /* cp points to "]...", scope points to "%eth0]..." */
140 overlapping_strcpy(scope, cp);
143 #if ENABLE_FEATURE_WGET_AUTHENTICATION
144 /* Base64-encode character string. */
145 static char *base64enc(const char *str)
147 unsigned len = strlen(str);
148 if (len > sizeof(G.wget_buf)/4*3 - 10) /* paranoia */
149 len = sizeof(G.wget_buf)/4*3 - 10;
150 bb_uuencode(G.wget_buf, str, len, bb_uuenc_tbl_base64);
155 static char* sanitize_string(char *s)
157 unsigned char *p = (void *) s;
164 static FILE *open_socket(len_and_sockaddr *lsa)
168 /* glibc 2.4 seems to try seeking on it - ??! */
169 /* hopefully it understands what ESPIPE means... */
170 fp = fdopen(xconnect_stream(lsa), "r+");
172 bb_perror_msg_and_die(bb_msg_memory_exhausted);
177 /* Returns '\n' if it was seen, else '\0'. Trims at first '\r' or '\n' */
178 static char fgets_and_trim(FILE *fp)
183 if (fgets(G.wget_buf, sizeof(G.wget_buf) - 1, fp) == NULL)
184 bb_perror_msg_and_die("error getting response");
186 buf_ptr = strchrnul(G.wget_buf, '\n');
189 buf_ptr = strchrnul(G.wget_buf, '\r');
192 log_io("< %s", G.wget_buf);
197 static int ftpcmd(const char *s1, const char *s2, FILE *fp)
203 fprintf(fp, "%s%s\r\n", s1, s2);
205 log_io("> %s%s", s1, s2);
210 } while (!isdigit(G.wget_buf[0]) || G.wget_buf[3] != ' ');
212 G.wget_buf[3] = '\0';
213 result = xatoi_positive(G.wget_buf);
218 static void parse_url(const char *src_url, struct host_info *h)
223 h->allocated = url = xstrdup(src_url);
225 if (strncmp(url, "http://", 7) == 0) {
226 h->port = bb_lookup_port("http", "tcp", 80);
229 } else if (strncmp(url, "ftp://", 6) == 0) {
230 h->port = bb_lookup_port("ftp", "tcp", 21);
234 bb_error_msg_and_die("not an http or ftp url: %s", sanitize_string(url));
237 // "Real" wget 'http://busybox.net?var=a/b' sends this request:
238 // 'GET /?var=a/b HTTP 1.0'
239 // and saves 'index.html?var=a%2Fb' (we save 'b')
240 // wget 'http://busybox.net?login=john@doe':
241 // request: 'GET /?login=john@doe HTTP/1.0'
242 // saves: 'index.html?login=john@doe' (we save '?login=john@doe')
243 // wget 'http://busybox.net#test/test':
244 // request: 'GET / HTTP/1.0'
245 // saves: 'index.html' (we save 'test')
247 // We also don't add unique .N suffix if file exists...
248 sp = strchr(h->host, '/');
249 p = strchr(h->host, '?'); if (!sp || (p && sp > p)) sp = p;
250 p = strchr(h->host, '#'); if (!sp || (p && sp > p)) sp = p;
253 } else if (*sp == '/') {
256 } else { // '#' or '?'
257 // http://busybox.net?login=john@doe is a valid URL
258 // memmove converts to:
259 // http:/busybox.nett?login=john@doe...
260 memmove(h->host - 1, h->host, sp - h->host);
266 // We used to set h->user to NULL here, but this interferes
267 // with handling of code 302 ("object was moved")
269 sp = strrchr(h->host, '@');
279 static char *gethdr(FILE *fp)
286 /* retrieve header line */
287 c = fgets_and_trim(fp);
289 /* end of the headers? */
290 if (G.wget_buf[0] == '\0')
293 /* convert the header name to lower case */
294 for (s = G.wget_buf; isalnum(*s) || *s == '-' || *s == '.'; ++s) {
295 /* tolower for "A-Z", no-op for "0-9a-z-." */
299 /* verify we are at the end of the header name */
301 bb_error_msg_and_die("bad header line: %s", sanitize_string(G.wget_buf));
303 /* locate the start of the header value */
305 hdrval = skip_whitespace(s);
308 /* Rats! The buffer isn't big enough to hold the entire header value */
309 while (c = getc(fp), c != EOF && c != '\n')
316 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
317 static char *URL_escape(const char *str)
319 /* URL encode, see RFC 2396 */
321 char *res = dst = xmalloc(strlen(str) * 3 + 1);
327 /* || strchr("!&'()*-.=_~", c) - more code */
339 || (c >= '0' && c <= '9')
340 || ((c|0x20) >= 'a' && (c|0x20) <= 'z')
347 *dst++ = bb_hexdigits_upcase[c >> 4];
348 *dst++ = bb_hexdigits_upcase[c & 0xf];
354 static FILE* prepare_ftp_session(FILE **dfpp, struct host_info *target, len_and_sockaddr *lsa)
361 target->user = xstrdup("anonymous:busybox@");
363 sfp = open_socket(lsa);
364 if (ftpcmd(NULL, NULL, sfp) != 220)
365 bb_error_msg_and_die("%s", sanitize_string(G.wget_buf + 4));
368 * Splitting username:password pair,
371 str = strchr(target->user, ':');
374 switch (ftpcmd("USER ", target->user, sfp)) {
378 if (ftpcmd("PASS ", str, sfp) == 230)
380 /* fall through (failed login) */
382 bb_error_msg_and_die("ftp login: %s", sanitize_string(G.wget_buf + 4));
385 ftpcmd("TYPE I", NULL, sfp);
390 if (ftpcmd("SIZE ", target->path, sfp) == 213) {
391 G.content_len = BB_STRTOOFF(G.wget_buf + 4, NULL, 10);
392 if (G.content_len < 0 || errno) {
393 bb_error_msg_and_die("SIZE value is garbage");
399 * Entering passive mode
401 if (ftpcmd("PASV", NULL, sfp) != 227) {
403 bb_error_msg_and_die("bad response to %s: %s", "PASV", sanitize_string(G.wget_buf));
405 // Response is "227 garbageN1,N2,N3,N4,P1,P2[)garbage]
406 // Server's IP is N1.N2.N3.N4 (we ignore it)
407 // Server's port for data connection is P1*256+P2
408 str = strrchr(G.wget_buf, ')');
409 if (str) str[0] = '\0';
410 str = strrchr(G.wget_buf, ',');
411 if (!str) goto pasv_error;
412 port = xatou_range(str+1, 0, 255);
414 str = strrchr(G.wget_buf, ',');
415 if (!str) goto pasv_error;
416 port += xatou_range(str+1, 0, 255) * 256;
417 set_nport(lsa, htons(port));
419 *dfpp = open_socket(lsa);
422 sprintf(G.wget_buf, "REST %"OFF_FMT"u", G.beg_range);
423 if (ftpcmd(G.wget_buf, NULL, sfp) == 350)
424 G.content_len -= G.beg_range;
427 if (ftpcmd("RETR ", target->path, sfp) > 150)
428 bb_error_msg_and_die("bad response to %s: %s", "RETR", sanitize_string(G.wget_buf));
433 static void NOINLINE retrieve_file_data(FILE *dfp, int output_fd)
435 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
436 # if ENABLE_FEATURE_WGET_TIMEOUT
439 struct pollfd polldata;
441 polldata.fd = fileno(dfp);
442 polldata.events = POLLIN | POLLPRI;
444 progress_meter(PROGRESS_START);
449 /* Loops only if chunked */
452 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
453 /* Must use nonblocking I/O, otherwise fread will loop
454 * and *block* until it reads full buffer,
455 * which messes up progress bar and/or timeout logic.
456 * Because of nonblocking I/O, we need to dance
457 * very carefully around EAGAIN. See explanation at
460 ndelay_on(polldata.fd);
466 rdsz = sizeof(G.wget_buf);
468 if (G.content_len < (off_t)sizeof(G.wget_buf)) {
469 if ((int)G.content_len <= 0)
471 rdsz = (unsigned)G.content_len;
475 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
476 # if ENABLE_FEATURE_WGET_TIMEOUT
477 second_cnt = G.timeout_seconds;
480 if (safe_poll(&polldata, 1, 1000) != 0)
481 break; /* error, EOF, or data is available */
482 # if ENABLE_FEATURE_WGET_TIMEOUT
483 if (second_cnt != 0 && --second_cnt == 0) {
484 progress_meter(PROGRESS_END);
485 bb_error_msg_and_die("download timed out");
488 /* Needed for "stalled" indicator */
489 progress_meter(PROGRESS_BUMP);
492 /* fread internally uses read loop, which in our case
493 * is usually exited when we get EAGAIN.
494 * In this case, libc sets error marker on the stream.
495 * Need to clear it before next fread to avoid possible
496 * rare false positive ferror below. Rare because usually
497 * fread gets more than zero bytes, and we don't fall
498 * into if (n <= 0) ...
503 n = fread(G.wget_buf, 1, rdsz, dfp);
505 * If error occurs, or EOF is reached, the return value
506 * is a short item count (or zero).
507 * fread does not distinguish between EOF and error.
510 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
511 if (errno == EAGAIN) /* poll lied, there is no data? */
515 bb_perror_msg_and_die(bb_msg_read_error);
516 break; /* EOF, not error */
519 xwrite(output_fd, G.wget_buf, n);
521 #if ENABLE_FEATURE_WGET_STATUSBAR
523 progress_meter(PROGRESS_BUMP);
527 if (G.content_len == 0)
531 #if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
533 ndelay_off(polldata.fd); /* else fgets can get very unhappy */
538 fgets_and_trim(dfp); /* Eat empty line */
541 G.content_len = STRTOOFF(G.wget_buf, NULL, 16);
542 /* FIXME: error check? */
543 if (G.content_len == 0)
544 break; /* all done! */
548 /* Draw full bar and free its resources */
549 G.chunked = 0; /* makes it show 100% even for chunked download */
550 progress_meter(PROGRESS_END);
553 static int download_one_url(const char *url)
555 bool use_proxy; /* Use proxies if env vars are set */
558 len_and_sockaddr *lsa;
559 FILE *sfp; /* socket to web/ftp server */
560 FILE *dfp; /* socket to ftp server (data) */
562 char *fname_out_alloc;
563 struct host_info server;
564 struct host_info target;
566 server.allocated = NULL;
567 target.allocated = NULL;
571 parse_url(url, &target);
573 /* Use the proxy if necessary */
574 use_proxy = (strcmp(G.proxy_flag, "off") != 0);
576 proxy = getenv(target.is_ftp ? "ftp_proxy" : "http_proxy");
577 if (proxy && proxy[0]) {
578 parse_url(proxy, &server);
584 server.port = target.port;
585 if (ENABLE_FEATURE_IPV6) {
586 //free(server.allocated); - can't be non-NULL
587 server.host = server.allocated = xstrdup(target.host);
589 server.host = target.host;
593 if (ENABLE_FEATURE_IPV6)
594 strip_ipv6_scope_id(target.host);
596 /* If there was no -O FILE, guess output filename */
598 fname_out_alloc = NULL;
599 if (!(option_mask32 & WGET_OPT_OUTNAME)) {
600 G.fname_out = bb_get_last_path_component_nostrip(target.path);
601 /* handle "wget http://kernel.org//" */
602 if (G.fname_out[0] == '/' || !G.fname_out[0])
603 G.fname_out = (char*)"index.html";
604 /* -P DIR is considered only if there was no -O FILE */
606 G.fname_out = fname_out_alloc = concat_path_file(G.dir_prefix, G.fname_out);
608 if (LONE_DASH(G.fname_out)) {
611 option_mask32 &= ~WGET_OPT_CONTINUE;
614 #if ENABLE_FEATURE_WGET_STATUSBAR
615 G.curfile = bb_get_last_path_component_nostrip(G.fname_out);
618 /* Determine where to start transfer */
619 if (option_mask32 & WGET_OPT_CONTINUE) {
620 output_fd = open(G.fname_out, O_WRONLY);
621 if (output_fd >= 0) {
622 G.beg_range = xlseek(output_fd, 0, SEEK_END);
624 /* File doesn't exist. We do not create file here yet.
625 * We are not sure it exists on remote side */
630 lsa = xhost2sockaddr(server.host, server.port);
631 if (!(option_mask32 & WGET_OPT_QUIET)) {
632 char *s = xmalloc_sockaddr2dotted(&lsa->u.sa);
633 fprintf(stderr, "Connecting to %s (%s)\n", server.host, s);
637 G.chunked = G.got_clen = 0;
638 if (use_proxy || !target.is_ftp) {
646 /* Open socket to http server */
647 sfp = open_socket(lsa);
649 /* Send HTTP request */
651 fprintf(sfp, "GET %stp://%s/%s HTTP/1.1\r\n",
652 target.is_ftp ? "f" : "ht", target.host,
655 if (option_mask32 & WGET_OPT_POST_DATA)
656 fprintf(sfp, "POST /%s HTTP/1.1\r\n", target.path);
658 fprintf(sfp, "GET /%s HTTP/1.1\r\n", target.path);
661 fprintf(sfp, "Host: %s\r\nUser-Agent: %s\r\n",
662 target.host, G.user_agent);
664 /* Ask server to close the connection as soon as we are done
665 * (IOW: we do not intend to send more requests)
667 fprintf(sfp, "Connection: close\r\n");
669 #if ENABLE_FEATURE_WGET_AUTHENTICATION
671 fprintf(sfp, "Proxy-Authorization: Basic %s\r\n"+6,
672 base64enc(target.user));
674 if (use_proxy && server.user) {
675 fprintf(sfp, "Proxy-Authorization: Basic %s\r\n",
676 base64enc(server.user));
681 fprintf(sfp, "Range: bytes=%"OFF_FMT"u-\r\n", G.beg_range);
683 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
685 fputs(G.extra_headers, sfp);
687 if (option_mask32 & WGET_OPT_POST_DATA) {
688 char *estr = URL_escape(G.post_data);
690 "Content-Type: application/x-www-form-urlencoded\r\n"
691 "Content-Length: %u\r\n"
694 (int) strlen(estr), estr
700 fprintf(sfp, "\r\n");
706 * Retrieve HTTP response line and check for "200" status code.
712 str = skip_non_whitespace(str);
713 str = skip_whitespace(str);
714 // FIXME: no error check
715 // xatou wouldn't work: "200 OK"
720 while (gethdr(sfp) != NULL)
721 /* eat all remaining headers */;
725 Response 204 doesn't say "null file", it says "metadata
726 has changed but data didn't":
728 "10.2.5 204 No Content
729 The server has fulfilled the request but does not need to return
730 an entity-body, and might want to return updated metainformation.
731 The response MAY include new or updated metainformation in the form
732 of entity-headers, which if present SHOULD be associated with
733 the requested variant.
735 If the client is a user agent, it SHOULD NOT change its document
736 view from that which caused the request to be sent. This response
737 is primarily intended to allow input for actions to take place
738 without causing a change to the user agent's active document view,
739 although any new or updated metainformation SHOULD be applied
740 to the document currently in the user agent's active view.
742 The 204 response MUST NOT include a message-body, and thus
743 is always terminated by the first empty line after the header fields."
745 However, in real world it was observed that some web servers
746 (e.g. Boa/0.94.14rc21) simply use code 204 when file size is zero.
750 case 300: /* redirection */
760 bb_error_msg_and_die("server returned error: %s", sanitize_string(G.wget_buf));
764 * Retrieve HTTP headers.
766 while ((str = gethdr(sfp)) != NULL) {
767 static const char keywords[] ALIGN1 =
768 "content-length\0""transfer-encoding\0""location\0";
770 KEY_content_length = 1, KEY_transfer_encoding, KEY_location
774 /* gethdr converted "FOO:" string to lowercase */
776 /* strip trailing whitespace */
777 char *s = strchrnul(str, '\0') - 1;
778 while (s >= str && (*s == ' ' || *s == '\t')) {
782 key = index_in_strings(keywords, G.wget_buf) + 1;
783 if (key == KEY_content_length) {
784 G.content_len = BB_STRTOOFF(str, NULL, 10);
785 if (G.content_len < 0 || errno) {
786 bb_error_msg_and_die("content-length %s is garbage", sanitize_string(str));
791 if (key == KEY_transfer_encoding) {
792 if (strcmp(str_tolower(str), "chunked") != 0)
793 bb_error_msg_and_die("transfer encoding '%s' is not supported", sanitize_string(str));
796 if (key == KEY_location && status >= 300) {
797 if (--redir_limit == 0)
798 bb_error_msg_and_die("too many redirections");
801 free(target.allocated);
802 target.path = target.allocated = xstrdup(str+1);
803 /* lsa stays the same: it's on the same server */
805 parse_url(str, &target);
807 free(server.allocated);
808 server.host = target.host;
809 /* strip_ipv6_scope_id(target.host); - no! */
810 /* we assume remote never gives us IPv6 addr with scope id */
811 server.port = target.port;
814 } /* else: lsa stays the same: we use proxy */
816 goto establish_session;
819 // if (status >= 300)
820 // bb_error_msg_and_die("bad redirection (no Location: header from server)");
822 /* For HTTP, data is pumped over the same connection */
829 sfp = prepare_ftp_session(&dfp, &target, lsa);
834 if (!(option_mask32 & WGET_OPT_SPIDER)) {
836 int o_flags = O_WRONLY | O_CREAT | O_TRUNC | O_EXCL;
837 /* compat with wget: -O FILE can overwrite */
838 if (option_mask32 & WGET_OPT_OUTNAME)
839 o_flags = O_WRONLY | O_CREAT | O_TRUNC;
840 output_fd = xopen(G.fname_out, o_flags);
842 retrieve_file_data(dfp, output_fd);
847 /* It's ftp. Close data connection properly */
849 if (ftpcmd(NULL, NULL, sfp) != 226)
850 bb_error_msg_and_die("ftp error: %s", sanitize_string(G.wget_buf + 4));
851 /* ftpcmd("QUIT", NULL, sfp); - why bother? */
855 free(server.allocated);
856 free(target.allocated);
857 free(fname_out_alloc);
862 int wget_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
863 int wget_main(int argc UNUSED_PARAM, char **argv)
865 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
866 static const char wget_longopts[] ALIGN1 =
867 /* name, has_arg, val */
868 "continue\0" No_argument "c"
869 //FIXME: -s isn't --spider, it's --save-headers!
870 "spider\0" No_argument "s"
871 "quiet\0" No_argument "q"
872 "output-document\0" Required_argument "O"
873 "directory-prefix\0" Required_argument "P"
874 "proxy\0" Required_argument "Y"
875 "user-agent\0" Required_argument "U"
876 #if ENABLE_FEATURE_WGET_TIMEOUT
877 "timeout\0" Required_argument "T"
880 // "tries\0" Required_argument "t"
881 /* Ignored (we always use PASV): */
882 "passive-ftp\0" No_argument "\xff"
883 "header\0" Required_argument "\xfe"
884 "post-data\0" Required_argument "\xfd"
885 /* Ignored (we don't do ssl) */
886 "no-check-certificate\0" No_argument "\xfc"
891 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
892 llist_t *headers_llist = NULL;
897 IF_FEATURE_WGET_TIMEOUT(G.timeout_seconds = 900;)
898 G.proxy_flag = "on"; /* use proxies if env vars are set */
899 G.user_agent = "Wget"; /* "User-Agent" header field */
901 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
902 applet_long_options = wget_longopts;
904 opt_complementary = "-1" IF_FEATURE_WGET_TIMEOUT(":T+") IF_FEATURE_WGET_LONG_OPTIONS(":\xfe::");
905 getopt32(argv, "csqO:P:Y:U:T:" /*ignored:*/ "t:",
906 &G.fname_out, &G.dir_prefix,
907 &G.proxy_flag, &G.user_agent,
908 IF_FEATURE_WGET_TIMEOUT(&G.timeout_seconds) IF_NOT_FEATURE_WGET_TIMEOUT(NULL),
909 NULL /* -t RETRIES */
910 IF_FEATURE_WGET_LONG_OPTIONS(, &headers_llist)
911 IF_FEATURE_WGET_LONG_OPTIONS(, &G.post_data)
915 #if ENABLE_FEATURE_WGET_LONG_OPTIONS
919 llist_t *ll = headers_llist;
921 size += strlen(ll->data) + 2;
924 G.extra_headers = cp = xmalloc(size);
925 while (headers_llist) {
926 cp += sprintf(cp, "%s\r\n", (char*)llist_pop(&headers_llist));
933 exitcode |= download_one_url(*argv++);